Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
46736328165a460065ef4498588cfe80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46736328165a460065ef4498588cfe80N.exe
Resource
win10v2004-20240802-en
General
-
Target
46736328165a460065ef4498588cfe80N.exe
-
Size
91KB
-
MD5
46736328165a460065ef4498588cfe80
-
SHA1
d7127b3fe6d0e2fa19ea82b8a216492190ebaf41
-
SHA256
a0fc7256d85e68d85ff0b89775e5442889ea8c6f5ce4c835a840c02841302f1d
-
SHA512
b6fde2d4b73852c211d380942b4218684844ab97f99eebc212d873adcd3e3b776b390c35b5d3e2913fab1518ced91c20ea44ba767303877496ac8c1e054fe75f
-
SSDEEP
1536:8F0Jgn6nVFJTsZoXl3vGJyf5mp5JoubyyJGZp04a1h4ZPNGf0obDvGBSArhjBR:zsqJTsilSB12aKa4akNGnbDvGBS2d
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 46736328165a460065ef4498588cfe80N.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 46736328165a460065ef4498588cfe80N.exe -
Loads dropped DLL 1 IoCs
pid Process 2852 46736328165a460065ef4498588cfe80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46736328165a460065ef4498588cfe80N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2852 46736328165a460065ef4498588cfe80N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2852 46736328165a460065ef4498588cfe80N.exe 2724 46736328165a460065ef4498588cfe80N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2724 2852 46736328165a460065ef4498588cfe80N.exe 31 PID 2852 wrote to memory of 2724 2852 46736328165a460065ef4498588cfe80N.exe 31 PID 2852 wrote to memory of 2724 2852 46736328165a460065ef4498588cfe80N.exe 31 PID 2852 wrote to memory of 2724 2852 46736328165a460065ef4498588cfe80N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\46736328165a460065ef4498588cfe80N.exe"C:\Users\Admin\AppData\Local\Temp\46736328165a460065ef4498588cfe80N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\46736328165a460065ef4498588cfe80N.exeC:\Users\Admin\AppData\Local\Temp\46736328165a460065ef4498588cfe80N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5f57c0e56d5665a8570286c3875c242f5
SHA1ff2ef11e96aaf1c9bf72dd8f514e68028938b587
SHA256c6c8d1489f8f0f8bb4ba5139871752c0e96a7b2dbd2830a316eea6b1b384dd81
SHA512ef16c2de2d8f8bfd1b6d4c40b15d61bec046e39807191fd2700896eb5e7a05b2212791807e3b6f45f5484002e72c9f8268d30a517833d4283c8b7bde41cf5a72