Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
a2ede8f521521a935a46a861571dcbb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2ede8f521521a935a46a861571dcbb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a2ede8f521521a935a46a861571dcbb0N.exe
-
Size
448KB
-
MD5
a2ede8f521521a935a46a861571dcbb0
-
SHA1
46ee251845d8848d5a77c1d87cca40d98b1c7131
-
SHA256
9c9cbede957d5bde9eede15bad06463145d71e4720000535159526389496da55
-
SHA512
9be5c01f968316331df7374d5088c4793136754c1d9127ae0476d984bb7a284566e52f97d1ff8ac4d2c481bacf7729796d838ddf605f440a21aa2cf83c8f8cb3
-
SSDEEP
6144:EbPahFCuKGPRQXrP18w1YqGGbMQlkEjiPISUOgW9X+hOGzC/NM:EbyhNDRQXj1F1YfQkmZzcukG2/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2572 KEQI.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\KEQI.exe a2ede8f521521a935a46a861571dcbb0N.exe File opened for modification C:\windows\KEQI.exe a2ede8f521521a935a46a861571dcbb0N.exe File created C:\windows\KEQI.exe.bat a2ede8f521521a935a46a861571dcbb0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2ede8f521521a935a46a861571dcbb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KEQI.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2396 a2ede8f521521a935a46a861571dcbb0N.exe 2572 KEQI.exe 2572 KEQI.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2396 a2ede8f521521a935a46a861571dcbb0N.exe 2396 a2ede8f521521a935a46a861571dcbb0N.exe 2572 KEQI.exe 2572 KEQI.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2124 2396 a2ede8f521521a935a46a861571dcbb0N.exe 30 PID 2396 wrote to memory of 2124 2396 a2ede8f521521a935a46a861571dcbb0N.exe 30 PID 2396 wrote to memory of 2124 2396 a2ede8f521521a935a46a861571dcbb0N.exe 30 PID 2396 wrote to memory of 2124 2396 a2ede8f521521a935a46a861571dcbb0N.exe 30 PID 2124 wrote to memory of 2572 2124 cmd.exe 32 PID 2124 wrote to memory of 2572 2124 cmd.exe 32 PID 2124 wrote to memory of 2572 2124 cmd.exe 32 PID 2124 wrote to memory of 2572 2124 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2ede8f521521a935a46a861571dcbb0N.exe"C:\Users\Admin\AppData\Local\Temp\a2ede8f521521a935a46a861571dcbb0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\KEQI.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\windows\KEQI.exeC:\windows\KEQI.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD581ae359ea1ae0f3e9831c76968e8b729
SHA103949b25b93f0552a6553562c7a63e7d26b1f3cb
SHA2566d5282eef5917a098b954970277568050205d3690085ed9d392dc158b66970b7
SHA5120fa2689a1b14d2b0defeb5c91b7a13026413e992f9be320c69cbbecc5b9fbcbdd57e11b3c3f39804c2f6b492083e5e7e5e5461986727d3d3a33e9efb8e5a10e1
-
Filesize
54B
MD5c24ee29716ee71cd4dfd63152aa354e2
SHA1f94b26183e54208e12a6ab97778557edeb6b822f
SHA256ad8283792bd1d6eaa9c8f109a3e82c733a7f0fc7ea0602311d8fa03e3756c4d6
SHA51200d05135d84d79b980074d6b35f3a7a6840f8a57db06ac9ca73d3383e8e8674b6cd27f34d6c20e606d4f395076d2cc42d3398e639d5d53eda0e4b513337d9893