Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
5bd14a58d14258522a4a110c7ff05c70N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5bd14a58d14258522a4a110c7ff05c70N.exe
Resource
win10v2004-20240802-en
General
-
Target
5bd14a58d14258522a4a110c7ff05c70N.exe
-
Size
84KB
-
MD5
5bd14a58d14258522a4a110c7ff05c70
-
SHA1
463ae3599a6cffcff2c33bb0e7fd5bc71c920295
-
SHA256
a3e0092c6d11efe7e392174dfa1e14dde2fcf8387251779050bfb7c49a0dea38
-
SHA512
a4d2633c8f80aa3dc05ce3bc577612bb767063ee6e95966b2a52871ba778afa2e37320794d3812cfef94818ae8df1c750f7e23c01f8654ce0b4acae109d73ff6
-
SSDEEP
1536:Oj0sDzbmbiSyzknD65oxbScbpTuHCNmg/Td1l8LONUIisem30:DmzTYDClTQTd1l8d7seV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3028 5bd14a58d14258522a4a110c7ff05c70N.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 5bd14a58d14258522a4a110c7ff05c70N.exe -
Loads dropped DLL 1 IoCs
pid Process 2676 5bd14a58d14258522a4a110c7ff05c70N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bd14a58d14258522a4a110c7ff05c70N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2676 5bd14a58d14258522a4a110c7ff05c70N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2676 5bd14a58d14258522a4a110c7ff05c70N.exe 3028 5bd14a58d14258522a4a110c7ff05c70N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3028 2676 5bd14a58d14258522a4a110c7ff05c70N.exe 29 PID 2676 wrote to memory of 3028 2676 5bd14a58d14258522a4a110c7ff05c70N.exe 29 PID 2676 wrote to memory of 3028 2676 5bd14a58d14258522a4a110c7ff05c70N.exe 29 PID 2676 wrote to memory of 3028 2676 5bd14a58d14258522a4a110c7ff05c70N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bd14a58d14258522a4a110c7ff05c70N.exe"C:\Users\Admin\AppData\Local\Temp\5bd14a58d14258522a4a110c7ff05c70N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\5bd14a58d14258522a4a110c7ff05c70N.exeC:\Users\Admin\AppData\Local\Temp\5bd14a58d14258522a4a110c7ff05c70N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD522b01af53efd96509bfce92e068724f3
SHA106c7a37e4de22d7ebe15a06edcf296c9fb6c830c
SHA2561833af1a03126fa3b062381dd4463d86192dfad988b012d1b854f856d6ca775a
SHA512c2f041aca79a6e622e165631ef37409a3af99a312311b8a8925789edb4f1175de0896ef8de3e88ceaba1c0cf7495630c69ce47847d425dc05134e35cc8043a49