Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
9a92271f5b4e7f4fcda1526199522c70N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9a92271f5b4e7f4fcda1526199522c70N.exe
Resource
win10v2004-20240802-en
General
-
Target
9a92271f5b4e7f4fcda1526199522c70N.exe
-
Size
97KB
-
MD5
9a92271f5b4e7f4fcda1526199522c70
-
SHA1
d645d1800a5e93ac7478709fb8b276aa3466e365
-
SHA256
15dfeaa1d3e644fc2627727b72135f00e1d83607de726ac98e8fcd72b40f5bda
-
SHA512
6f88616eb36d7909c4c57596a12f4a18668e4720b9cf370491f3f72d9dc17077a8c47c6fa963bb78610b1002411c15deaa5d79a0ad0ee1d38d0364fbe3f24ca0
-
SSDEEP
1536:jk3Kfxlw6+JOclgW38j3fxgj5rOSb1Z2Z8CfefrDWO/8nPm8g4pZc:jk3KUJJsj3fKFJP3/r67PmmpZc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 9a92271f5b4e7f4fcda1526199522c70N.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 9a92271f5b4e7f4fcda1526199522c70N.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 9a92271f5b4e7f4fcda1526199522c70N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a92271f5b4e7f4fcda1526199522c70N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2716 9a92271f5b4e7f4fcda1526199522c70N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2716 9a92271f5b4e7f4fcda1526199522c70N.exe 2740 9a92271f5b4e7f4fcda1526199522c70N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2740 2716 9a92271f5b4e7f4fcda1526199522c70N.exe 31 PID 2716 wrote to memory of 2740 2716 9a92271f5b4e7f4fcda1526199522c70N.exe 31 PID 2716 wrote to memory of 2740 2716 9a92271f5b4e7f4fcda1526199522c70N.exe 31 PID 2716 wrote to memory of 2740 2716 9a92271f5b4e7f4fcda1526199522c70N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a92271f5b4e7f4fcda1526199522c70N.exe"C:\Users\Admin\AppData\Local\Temp\9a92271f5b4e7f4fcda1526199522c70N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\9a92271f5b4e7f4fcda1526199522c70N.exeC:\Users\Admin\AppData\Local\Temp\9a92271f5b4e7f4fcda1526199522c70N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD58b9457d0ab5612e724b499c11f8db232
SHA15aa4419f41662fbdb3a24a9e61ec17fa5021cd71
SHA256e12924b39f0e2cda8c2c247e616343dd8d701dc98a3bc7053947b80fcacc86c7
SHA512a7d9c438c7ecd1a7861c41463c0ce6fd0feb21f18e22123c1490312db8f2038c982582acfbca70a7e2d122e2a8123345821b85440c31f84b89d56812d6b8874f