Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
485a5704457f819f8a36cc807dc1fc80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
485a5704457f819f8a36cc807dc1fc80N.exe
Resource
win10v2004-20240802-en
General
-
Target
485a5704457f819f8a36cc807dc1fc80N.exe
-
Size
500KB
-
MD5
485a5704457f819f8a36cc807dc1fc80
-
SHA1
1e4ae8866099267b7f7b5d934c967a6ae7c32d7b
-
SHA256
b9125eaba6c0ba4f7404e34c8f446396567734a70ae80ce96365220c0e8cb333
-
SHA512
9e7c1fabadc0430e129ad937faa386554597f1edac35111840903c0c139e82ca2f4fdd57b5fed6f0dfa0ecf0b8bd71ab5d115b951b2dd083230df6ad0ae1646f
-
SSDEEP
12288:8WBm+95nHfF2mgewFx5q+UK5BMl1pfxpFP1kfgjdkA:8WBz95ndbgfx5q+UKYppFggjT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 7B48.tmp -
Executes dropped EXE 1 IoCs
pid Process 2308 7B48.tmp -
Loads dropped DLL 1 IoCs
pid Process 588 485a5704457f819f8a36cc807dc1fc80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 485a5704457f819f8a36cc807dc1fc80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7B48.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2308 7B48.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2308 588 485a5704457f819f8a36cc807dc1fc80N.exe 30 PID 588 wrote to memory of 2308 588 485a5704457f819f8a36cc807dc1fc80N.exe 30 PID 588 wrote to memory of 2308 588 485a5704457f819f8a36cc807dc1fc80N.exe 30 PID 588 wrote to memory of 2308 588 485a5704457f819f8a36cc807dc1fc80N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe"C:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\7B48.tmp"C:\Users\Admin\AppData\Local\Temp\7B48.tmp" --pingC:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe C8CA12F8D34A6BD30F74AE593863069CDBFE75068B6D73A654BF75A59A1EECC767C60415BD4D34E1FBA8B2CD108332FF4213691AB4960C76B1A5C5B67A11E9682⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500KB
MD5a078c2e911639858a5c06b056b56f699
SHA1cc0d28d810d70810372831cc13597e268ae09c5d
SHA256cbefc985f26e0e4f5d1ba5d5a918bd0430d37edd781b4ee1c8c9279c942d5d97
SHA512204e6c09969ad1a36ede4576259da89edec015214395ec1dca8beef67d615388528fefffad65c2efa210daf4b31c02086266e592079b61d941a90aa25e14f74f