Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 00:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
09221da26d60cc5991002bc477af3b20N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
09221da26d60cc5991002bc477af3b20N.exe
Resource
win10v2004-20240802-en
General
-
Target
09221da26d60cc5991002bc477af3b20N.exe
-
Size
268KB
-
MD5
09221da26d60cc5991002bc477af3b20
-
SHA1
6db7dce18278ac296984013ae6812ce16b62dce8
-
SHA256
bdfe6e1af0c22e5f08f8985ed10ed6079fea7da9118989f00412251d574fa1c5
-
SHA512
fd7de604d7686fe297494450809cefb03630cd0ed2f9c4a8931c69fce0a95110011cd45545212d86e7c4bb33ec28a92f4a289ce23ae04240e30afd0088da4ab4
-
SSDEEP
3072:IwiRPM/kufT8Vs3VjN2RQtCf/8PmX/lo7EOlPwUcDTM36RipZ3s2g:IzpM/k2ws3VWQo38PqyoZrRib
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1960 09221da26d60cc5991002bc477af3b20N.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 09221da26d60cc5991002bc477af3b20N.exe -
Loads dropped DLL 1 IoCs
pid Process 624 09221da26d60cc5991002bc477af3b20N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09221da26d60cc5991002bc477af3b20N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 624 09221da26d60cc5991002bc477af3b20N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1960 09221da26d60cc5991002bc477af3b20N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 624 wrote to memory of 1960 624 09221da26d60cc5991002bc477af3b20N.exe 31 PID 624 wrote to memory of 1960 624 09221da26d60cc5991002bc477af3b20N.exe 31 PID 624 wrote to memory of 1960 624 09221da26d60cc5991002bc477af3b20N.exe 31 PID 624 wrote to memory of 1960 624 09221da26d60cc5991002bc477af3b20N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\09221da26d60cc5991002bc477af3b20N.exe"C:\Users\Admin\AppData\Local\Temp\09221da26d60cc5991002bc477af3b20N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\09221da26d60cc5991002bc477af3b20N.exeC:\Users\Admin\AppData\Local\Temp\09221da26d60cc5991002bc477af3b20N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD57d175ad9617e7a3fae2411ddc0ab4320
SHA141a96b4cc3eeb3609e1726fae53ce9de315e91ce
SHA2562d685ec84d0311e7f5a7b6415c68ee8cebf511762fed3d5a9dd74d715e09d724
SHA51211d5eb3877b8ef9ed5e8a32305a53f7742fe6ba2ae4c9ef87bda1d081181175547ed82dc7bed32f5f947dbeb1bfd87baa3073240537b4b170979e87dcd15da63