Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 06:34
Behavioral task
behavioral1
Sample
6fd5a5b276ec833984d10066aa543240N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6fd5a5b276ec833984d10066aa543240N.exe
Resource
win10v2004-20240802-en
General
-
Target
6fd5a5b276ec833984d10066aa543240N.exe
-
Size
59KB
-
MD5
6fd5a5b276ec833984d10066aa543240
-
SHA1
a0576235c4d44a78e6d5f056e05fa2c0c6d9ce5d
-
SHA256
2b608671bb4dd3371486f11cd82867ab1807022c85b45e9f2d244bb9b6b724dd
-
SHA512
5e498641275153cf7afb34ff8671c12107a311785e5a74d71f65d1444b9732bc4f9c8d34d8698e7aec452355bd607099eae4de15230ee4f85c9da05e308b87f2
-
SSDEEP
1536:3+ZgwRdiE8cO4p1xRjfTvSq5r3ZiIZ4nouy8uh1aQQ:OeodiUO4p13b9HiIeoutuh1aQQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 AhnSvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2320 6fd5a5b276ec833984d10066aa543240N.exe 2320 6fd5a5b276ec833984d10066aa543240N.exe -
resource yara_rule behavioral1/memory/2320-0-0x0000000000F00000-0x0000000000F27000-memory.dmp upx behavioral1/files/0x0006000000019256-7.dat upx behavioral1/memory/2496-11-0x0000000000230000-0x0000000000257000-memory.dmp upx behavioral1/memory/2320-12-0x0000000000F00000-0x0000000000F27000-memory.dmp upx behavioral1/memory/2496-13-0x0000000000230000-0x0000000000257000-memory.dmp upx behavioral1/memory/2320-21-0x0000000000F00000-0x0000000000F27000-memory.dmp upx behavioral1/memory/2496-22-0x0000000000230000-0x0000000000257000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AhnUpadate = "\"C:\\ProgramData\\AhnLab\\AhnSvc.exe\" /run" 6fd5a5b276ec833984d10066aa543240N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fd5a5b276ec833984d10066aa543240N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2320 6fd5a5b276ec833984d10066aa543240N.exe Token: SeDebugPrivilege 2496 AhnSvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2496 2320 6fd5a5b276ec833984d10066aa543240N.exe 29 PID 2320 wrote to memory of 2496 2320 6fd5a5b276ec833984d10066aa543240N.exe 29 PID 2320 wrote to memory of 2496 2320 6fd5a5b276ec833984d10066aa543240N.exe 29 PID 2320 wrote to memory of 2496 2320 6fd5a5b276ec833984d10066aa543240N.exe 29 PID 2320 wrote to memory of 2896 2320 6fd5a5b276ec833984d10066aa543240N.exe 30 PID 2320 wrote to memory of 2896 2320 6fd5a5b276ec833984d10066aa543240N.exe 30 PID 2320 wrote to memory of 2896 2320 6fd5a5b276ec833984d10066aa543240N.exe 30 PID 2320 wrote to memory of 2896 2320 6fd5a5b276ec833984d10066aa543240N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fd5a5b276ec833984d10066aa543240N.exe"C:\Users\Admin\AppData\Local\Temp\6fd5a5b276ec833984d10066aa543240N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\ProgramData\AhnLab\AhnSvc.exe"C:\ProgramData\AhnLab\AhnSvc.exe" /run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\6fd5a5b276ec833984d10066aa543240N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5660fbc3e8b15e83d66ec933b98e85454
SHA1bdcb69b6dba45181eaf4370d03f63581a2039efb
SHA256dd493012e84af6a295f1fca43be472b1118f3fce60d5997f5859d8a01cd15e71
SHA512ef0291e0d400dc35ced718982461733946d17a8ce1c0dc540846d43284a52343f5b86a8ed165f75491214bba9b590888e3020ced2e729be703a90b82f5ee8df9