Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe
-
Size
519KB
-
MD5
aaf009498fd654fe098a30d1ec1d3120
-
SHA1
d6de6ea6d8deb0b700cda51e8f366d3a333ffa29
-
SHA256
1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d
-
SHA512
6c601a13522500196ac58dc3b75ead4b438ddc149a4e1513a0657ea69be98845428f0bd76285218053532bfb59f702e091310dc92e00d9af1a7def2416581460
-
SSDEEP
6144:+xwgiJ4h+W4PQgPniiWn14owKYHvYLPG7nIsJmwu1WGFKPVMmNK1ftxU3WaN5rfx:cS4QZyn14rBHcgpJmwuAN7Cfn2v5P
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2596 2316 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2596 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 30 PID 2316 wrote to memory of 2596 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 30 PID 2316 wrote to memory of 2596 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 30 PID 2316 wrote to memory of 2596 2316 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe"C:\Users\Admin\AppData\Local\Temp\1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 5162⤵
- Program crash
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912B
MD5447c4399d7ff2ca7ea555f709291e2b4
SHA139a38ddc62420bcb1f11d3897d6a8d1b0a757b72
SHA25686e2c6cf942e63cafefd3336275838f7202f583d4706cb3e17344269de8e3733
SHA512347cafca08715b9df8a5d49931598a9da2d48886c3728a9653233f3267a40365fe8bd592a538de378633904dea2c1c96f1cdeea3490df24fefaef2fbd2f11a08
-
Filesize
5KB
MD5af4324802813a5a897db2167fc10e291
SHA1916bd47457dcb4247743626e86492436b77bebf8
SHA25692cb3b3a7280246743543325d3fe9a7d72c63227f9540d25d5ef27b2ce8856b4
SHA512cb3e07c4558049634078808bd419860c6e2855a02bba79541cea80873fe6db58cf667a27c111521df09ef30f92c149736092c473fde28bbb5974be6d7ddab83c
-
Filesize
12KB
MD56c38da8922cc37b4bbb77de4a63ad843
SHA14e0533fd11df8bddbd543ed58df7b6060d9f4631
SHA2561624d9ad8b2e2658af224691263f64388ba3a997efe80011889e3c35237ce4c1
SHA512ad0be3d7e57da9c304e9b9cac5341b6c76b157456ab44f5579d6c38c830a31c9c3e1e9a875b8f465243c607ea2ede6b0bb77237f17a70a4d4c78606e036c3430