Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe
Resource
win10v2004-20240802-en
General
-
Target
7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe
-
Size
10.9MB
-
MD5
9849612382a2aecdb61d929b8dc509b5
-
SHA1
463c96861bd07f4c8333beec74dd68155b480599
-
SHA256
7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e
-
SHA512
623315365b474b87a190e1e242d8895065cc4fa50ef39be673f63376ed00bb33c885b5d58667e69f8d0e0b32c8902d6042bc1c0639f7e8761194c9e148aaeb18
-
SSDEEP
196608:ubGnWW5WySSJ7PbDdh0HtQba8z1sjzkAilU4I4:uKnW6Wy5J7PbDjOQba8psjzyz
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 1512 7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe 1512 7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1512 7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe"C:\Users\Admin\AppData\Local\Temp\7394985ddfa5d92e9f7ed6712fc3a0d7fc834324ebfbd84d9b3a6080691a073e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5977d030e572e74972293d128ebaee072
SHA116fb7a85108e76fe3b11d8fe043e5caafc555c84
SHA2567c8aa134a2b025c2c98d71bdd64bc24bf40c02a65e5884bfffd2eb4ee4c40e16
SHA512de270bd2336185324a563394c25cc4b916919705535cdc9898bf7cbcad8d5eabdc4d59ef7371fb2a3a0ff2d7a7b7935893fb041683fdb3cd9a86b81cfe88b8ea
-
Filesize
2KB
MD52d6a5cce109ba578ba3ea2d732718159
SHA11955758b3363c9acddd93d7777f9976c89eba3c9
SHA256ce790be35697343a8df0d1eb724f9d2814f0df25650f698f8f3ff200e7773e51
SHA512e0a2a3b7d045b04800d8c991d7d9bafcce179221ef37e2aedd1f6f903014959d1fcb7df0e1d903821dea625b432bd4b99be7fdd7a31287ef729400f4e2b5b98a
-
Filesize
38B
MD5e8d55ce3a909eb7dad1704f87c266ad8
SHA14d3fb484114d4812b0b4f97d7a434521329314d2
SHA256f205fbafef8a4ed584d98bfca18dd416ea4aeb75911e97d6be5b7a55be7394d6
SHA5124765ddeff820cbb6f55bafef0bf969fef2d8f31d32db923d6906045c17da1e3a91772fc08c0e444a183e13b5ed11234fb8c55f97a00c1a4edf22029f991d0394