Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 21:55 UTC

General

  • Target

    d3b57c60c3df60583be7db4c64f63ea0N.exe

  • Size

    206KB

  • MD5

    d3b57c60c3df60583be7db4c64f63ea0

  • SHA1

    bea47defa14136208bae5d4d6d49a6628d0e8d3d

  • SHA256

    3db2bf8aadcc47dc9830396a07bc896634ab6028f222404438f8fcd2ff582103

  • SHA512

    6bf5518c0ac06d4108a99973604ec82edaf9b654cb62d23d57014dbf4ac5312f4a97e6e81d3a9e3753e48a84b1a2cf9cc2592d239eaf69102021badff4db3194

  • SSDEEP

    6144:WDbJX4alg8npg9tY72QraPF5ubz7T5l2wYNL9fw:EXPlNna3Q2QKQz7N3cL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3b57c60c3df60583be7db4c64f63ea0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d3b57c60c3df60583be7db4c64f63ea0N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Program Files\English\American.exe
      "C:\Program Files\English\American.exe" "33201"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\English\American.exe

    Filesize

    206KB

    MD5

    46ed5c731fa3e51a12ed3c87019ce63e

    SHA1

    ad8950dcd61b2a77ff206caa9edea3011cca0a16

    SHA256

    daa758942da418aa9a4c1ad9f1664172d141efca179842c2c5396b98ea7c7a18

    SHA512

    42236705c4e27e00b0aa084289a511417b954d6fd8723bdc8a85a7a3c61c2f93292e228c4d94c0cfa26a6d5f6dafe45762ac178f40ec1cca85c95da95464e84a

  • memory/1140-0-0x0000000000400000-0x0000000000578000-memory.dmp

    Filesize

    1.5MB

  • memory/1140-8-0x0000000002530000-0x00000000026A8000-memory.dmp

    Filesize

    1.5MB

  • memory/1140-12-0x0000000000400000-0x0000000000578000-memory.dmp

    Filesize

    1.5MB

  • memory/2568-10-0x0000000000400000-0x0000000000578000-memory.dmp

    Filesize

    1.5MB

  • memory/2568-13-0x0000000000400000-0x0000000000578000-memory.dmp

    Filesize

    1.5MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.