Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
Infatica P2B/infatica_agent.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Infatica P2B/infatica_agent.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Infatica P2B/unins000.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Infatica P2B/unins000.exe
Resource
win10v2004-20240802-en
General
-
Target
Infatica P2B/unins000.exe
-
Size
1.1MB
-
MD5
0c083266eec7437ba0dfe44e451ab71f
-
SHA1
4754cda6c84cea49c6a1f0d79b2c42958de2c7e9
-
SHA256
d2dcf7ed0c656532ed25cd496ac237223985bb56cb688f125cbbf940ddb9c6bb
-
SHA512
08c7140b707f78d1203f5cf21bf55dab32a63f71cf8c530af4afcfaf5a42f9431a09794708d57102d065955b1e296dab979855579e445bfdfbf649f75ce3ce22
-
SSDEEP
24576:JtdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFt5lTxytj:3qTytRFk6ek1Lo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\International\Geo\Nation _iu14D2N.tmp -
Deletes itself 1 IoCs
pid Process 2376 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 2376 _iu14D2N.tmp -
Loads dropped DLL 1 IoCs
pid Process 2380 unins000.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _iu14D2N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 1800 taskkill.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1800 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2376 2380 unins000.exe 30 PID 2380 wrote to memory of 2376 2380 unins000.exe 30 PID 2380 wrote to memory of 2376 2380 unins000.exe 30 PID 2380 wrote to memory of 2376 2380 unins000.exe 30 PID 2380 wrote to memory of 2376 2380 unins000.exe 30 PID 2380 wrote to memory of 2376 2380 unins000.exe 30 PID 2380 wrote to memory of 2376 2380 unins000.exe 30 PID 2376 wrote to memory of 1800 2376 _iu14D2N.tmp 32 PID 2376 wrote to memory of 1800 2376 _iu14D2N.tmp 32 PID 2376 wrote to memory of 1800 2376 _iu14D2N.tmp 32 PID 2376 wrote to memory of 1800 2376 _iu14D2N.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infatica P2B\unins000.exe"C:\Users\Admin\AppData\Local\Temp\Infatica P2B\unins000.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\Infatica P2B\unins000.exe" /FIRSTPHASEWND=$7018E2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /T /F /IM infatica_agent.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50c083266eec7437ba0dfe44e451ab71f
SHA14754cda6c84cea49c6a1f0d79b2c42958de2c7e9
SHA256d2dcf7ed0c656532ed25cd496ac237223985bb56cb688f125cbbf940ddb9c6bb
SHA51208c7140b707f78d1203f5cf21bf55dab32a63f71cf8c530af4afcfaf5a42f9431a09794708d57102d065955b1e296dab979855579e445bfdfbf649f75ce3ce22