Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe
Resource
win10v2004-20240802-en
General
-
Target
7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe
-
Size
208KB
-
MD5
5673111a1583acdb8e0c3c5d17c05b95
-
SHA1
69929b1fd9b78e0fbb953bd14aa4eb5685cdee33
-
SHA256
7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713
-
SHA512
20efdf7dbd1ea1250f5fef66e220906ecf249728b68f244056623f96a87412b762ac8013539ef6a7d777b0728a33c5b60bf1e3854eeee2864ab0c552abe9cda5
-
SSDEEP
6144:kr6hRlL9gwxweLSPlTvamqLC6/CQ0w0QEj:kOOw6dbqLC66o0Q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 COLISP.exe -
Loads dropped DLL 2 IoCs
pid Process 2760 cmd.exe 2760 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\COLISP.exe 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe File opened for modification C:\windows\SysWOW64\COLISP.exe 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe File created C:\windows\SysWOW64\COLISP.exe.bat 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COLISP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1732 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe 2860 COLISP.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1732 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe 1732 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe 2860 COLISP.exe 2860 COLISP.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2760 1732 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe 29 PID 1732 wrote to memory of 2760 1732 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe 29 PID 1732 wrote to memory of 2760 1732 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe 29 PID 1732 wrote to memory of 2760 1732 7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe 29 PID 2760 wrote to memory of 2860 2760 cmd.exe 31 PID 2760 wrote to memory of 2860 2760 cmd.exe 31 PID 2760 wrote to memory of 2860 2760 cmd.exe 31 PID 2760 wrote to memory of 2860 2760 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe"C:\Users\Admin\AppData\Local\Temp\7dcedf1a590c4266dc624c23188f18be722410243722ce32f3358a161b42e713.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\COLISP.exe.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\windows\SysWOW64\COLISP.exeC:\windows\system32\COLISP.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD56bfe1750f023b82e46c95488273683bc
SHA12e3d67094960a07545ecc1f506dea1f378889e81
SHA256ed23b117ac175c32faa562b98087da68496a1805a15731108b22b95aaa51e8fc
SHA5121fbf4cbafa32e6fc4e6856292060e991d55db59dafba022619a7722d828e851c9dd5081adffc341465814e8d7dbd86365d3e1b5ea1e8892567e295e1e3725912
-
Filesize
208KB
MD517ea1141a097b8dd27072950af57408d
SHA1cca88064e02160f697560e81d2a57a7c0faead04
SHA2569e5f8dd6a3642840510a7362637ef7215c7265204137b28a6a18315607aea8d5
SHA5128846a0c9ec0c33eb5fbb3375b75e3b16ee93f9defe250c33a07646e5f567bb548309c2c164f24ae2b792cd71bdcaf1c61a224ba4c79a37ed64dfa16bca622838