Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
98a842f4cb63a098799a32253254a3e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
98a842f4cb63a098799a32253254a3e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
98a842f4cb63a098799a32253254a3e0N.exe
-
Size
1.1MB
-
MD5
98a842f4cb63a098799a32253254a3e0
-
SHA1
db45e72c0cacfe3cac4e139d0cbdad3e4199dcac
-
SHA256
30c29a9ddc1ead0932ebf8b374d605a9dad97250968e51011605583e51d8f0a6
-
SHA512
692bec311120f04ec20ff5ce41a54b0731eea45b0a93e7b26dca7d305be283af4c6364582b83bf50fac8b3c54be804432063f629b5b6818b4648a1c5a85dc638
-
SSDEEP
24576:Z9ndEVf7TpiaGlN5WUG16CU3nM9SVYPxrkI5:Z9dcjTpia25W/7UXM9SVemI5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2352 Isass.exe 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 2688 GS_98a842f4cb63a098799a32253254a3e0N.exe -
Loads dropped DLL 5 IoCs
pid Process 2480 98a842f4cb63a098799a32253254a3e0N.exe 2480 98a842f4cb63a098799a32253254a3e0N.exe 2480 98a842f4cb63a098799a32253254a3e0N.exe 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 2688 GS_98a842f4cb63a098799a32253254a3e0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 98a842f4cb63a098799a32253254a3e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 98a842f4cb63a098799a32253254a3e0N.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe 98a842f4cb63a098799a32253254a3e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GS_98a842f4cb63a098799a32253254a3e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GS_98a842f4cb63a098799a32253254a3e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98a842f4cb63a098799a32253254a3e0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2480 98a842f4cb63a098799a32253254a3e0N.exe 2352 Isass.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2352 2480 98a842f4cb63a098799a32253254a3e0N.exe 30 PID 2480 wrote to memory of 2352 2480 98a842f4cb63a098799a32253254a3e0N.exe 30 PID 2480 wrote to memory of 2352 2480 98a842f4cb63a098799a32253254a3e0N.exe 30 PID 2480 wrote to memory of 2352 2480 98a842f4cb63a098799a32253254a3e0N.exe 30 PID 2480 wrote to memory of 2764 2480 98a842f4cb63a098799a32253254a3e0N.exe 31 PID 2480 wrote to memory of 2764 2480 98a842f4cb63a098799a32253254a3e0N.exe 31 PID 2480 wrote to memory of 2764 2480 98a842f4cb63a098799a32253254a3e0N.exe 31 PID 2480 wrote to memory of 2764 2480 98a842f4cb63a098799a32253254a3e0N.exe 31 PID 2480 wrote to memory of 2764 2480 98a842f4cb63a098799a32253254a3e0N.exe 31 PID 2480 wrote to memory of 2764 2480 98a842f4cb63a098799a32253254a3e0N.exe 31 PID 2480 wrote to memory of 2764 2480 98a842f4cb63a098799a32253254a3e0N.exe 31 PID 2764 wrote to memory of 2688 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 32 PID 2764 wrote to memory of 2688 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 32 PID 2764 wrote to memory of 2688 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 32 PID 2764 wrote to memory of 2688 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 32 PID 2764 wrote to memory of 2688 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 32 PID 2764 wrote to memory of 2688 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 32 PID 2764 wrote to memory of 2688 2764 GS_98a842f4cb63a098799a32253254a3e0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\98a842f4cb63a098799a32253254a3e0N.exe"C:\Users\Admin\AppData\Local\Temp\98a842f4cb63a098799a32253254a3e0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\GS_98a842f4cb63a098799a32253254a3e0N.exe"C:\Users\Admin\AppData\Local\Temp\GS_98a842f4cb63a098799a32253254a3e0N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Temp\{0B25FCF5-A65D-4F71-A3E3-4BCB200C34DC}\.cr\GS_98a842f4cb63a098799a32253254a3e0N.exe"C:\Windows\Temp\{0B25FCF5-A65D-4F71-A3E3-4BCB200C34DC}\.cr\GS_98a842f4cb63a098799a32253254a3e0N.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\GS_98a842f4cb63a098799a32253254a3e0N.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1883⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5deb205aab1f21cfbdb4929194ad7e5ac
SHA1b86cd30bf8125918ba61902787fbb4583ad1ea4f
SHA256c8ae8da7e558e44ea789d15fb47c1a606e8763e72d477f437648d627c5eb5e67
SHA51252e76f568cc4397ae8e669bfe1bd86ce03e456092aef9a09077296e33042af16ac8c3ccd8d4c2efd2e7524c5dc18bd91d1c182b2dd7b7a6834fdbe388b2dd899
-
Filesize
855KB
MD57711c60d5db60b1dfd6660016cf02d6f
SHA16b38524ee7961e9bd224c75ead54449c0d77bb12
SHA256f13fda5a87d010e15eb167e5dcaec27121e4427ae9c8c9991db95ed5fe36de1b
SHA51255aac69297dd5a19d8a78e0e36ce6be23d940d26ac4831e1db09c9aa5b43243158b8f2b24df4a2638b98442c305b0bd1547d8c597c8339e5938e73417820ac37
-
Filesize
50KB
MD5888eb713a0095756252058c9727e088a
SHA1c14f69f2bef6bc3e2162b4dd78e9df702d94cdb4
SHA25679434bd1368f47f08acf6db66638531d386bf15166d78d9bfea4da164c079067
SHA5127c59f4ada242b19c2299b6789a65a1f34565fed78730c22c904db16a9872fe6a07035c6d46a64ee94501fbcd96de586a8a5303ca22f33da357d455c014820ca0
-
Filesize
671KB
MD55d8fa952950469a8904e4f68ac193699
SHA1ce9f68fb9601b9a5b95fc93c88a3a22ed42afa3d
SHA256ca7527124a97079c229332867bd27fede3eb263a52639b4bdaf39ed47e604e57
SHA51258c43a813ff9f5bebe2928e68b7f28f999922248ccc6e8cf6ce5f14baf6aa42b9b8e59fe9b638c5376e7e4e86fe21eae185fd51328b7b000bbe6903794e161b4