Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
96d32145cd4f614dfae4de9d53795e70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
96d32145cd4f614dfae4de9d53795e70N.exe
Resource
win10v2004-20240802-en
General
-
Target
96d32145cd4f614dfae4de9d53795e70N.exe
-
Size
223KB
-
MD5
96d32145cd4f614dfae4de9d53795e70
-
SHA1
6d6ac35ca08374aaeae05d15bf5df18f55f5d1dd
-
SHA256
b62ea0c724cd07aeec74c6ab25bcfecfb99a202e1c479f7fc19c84cab0f73309
-
SHA512
588c2dcf1995d1384439939ca03777b615fa383e071450ca8229993599206b06fac916656836a4bf7aab70ac5c6e7410899b767d55bc5e5431a61badc13ec20e
-
SSDEEP
3072:/DSp4183Sf3/pF79wS6o+gUCebPmKmh6WPsbs9L1qu/Ptm3Jqyd/4XKI:C4/LuS+WcPmKmsEsY9RqSs3JqyiXKI
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2332 shzxojm.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\shzxojm.exe 96d32145cd4f614dfae4de9d53795e70N.exe File created C:\PROGRA~3\Mozilla\axpbjmm.dll shzxojm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shzxojm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96d32145cd4f614dfae4de9d53795e70N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3044 96d32145cd4f614dfae4de9d53795e70N.exe 2332 shzxojm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2332 2060 taskeng.exe 31 PID 2060 wrote to memory of 2332 2060 taskeng.exe 31 PID 2060 wrote to memory of 2332 2060 taskeng.exe 31 PID 2060 wrote to memory of 2332 2060 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d32145cd4f614dfae4de9d53795e70N.exe"C:\Users\Admin\AppData\Local\Temp\96d32145cd4f614dfae4de9d53795e70N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3044
-
C:\Windows\system32\taskeng.exetaskeng.exe {3DF728D2-1CC4-4861-93CA-0EBB4A023F24} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\PROGRA~3\Mozilla\shzxojm.exeC:\PROGRA~3\Mozilla\shzxojm.exe -lxzgtlg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5c568186020de83ccb9b0b7465a133a25
SHA192de97eabb59c1f443c0db4a402a8d02331649d6
SHA25663dca74699b6a0928d8c0dfd93e8c07dac1efe63b9d75444fe8a6e75928a0f04
SHA51239a79997a3e4af60e23273de689f3b0d9d257cf9c650a9b372244d51ab592c104647927aad2a2c2f2e7a8dbd6cdaa798472ce52aaada0dd4bf6642fd6318951f