Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 01:12 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b7abf1fad5b898b5d54a54571e3b2890N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b7abf1fad5b898b5d54a54571e3b2890N.exe
Resource
win10v2004-20240802-en
General
-
Target
b7abf1fad5b898b5d54a54571e3b2890N.exe
-
Size
1.6MB
-
MD5
b7abf1fad5b898b5d54a54571e3b2890
-
SHA1
95b4dcee4b247c831e845b784be651b0dc194638
-
SHA256
6b16fd76e7286ae01419766ccd8e87ff5a3767b7d2c344add605125a8ce68603
-
SHA512
ea431bc0d7282fbc94762be49a63f2d3b3a28c113bdcdb0f87945d7350ca8f5575dcc7a41e3c94653d23923844624709627bda052057ee7f295cbafb5141e19c
-
SSDEEP
49152:k3FvTMFQW5cAFcICbgtWl4mrbYE+3Mq0deC76CHdRyD:GFvoGAZCUWl4mrE9SQC76CHdRyD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1960 b7abf1fad5b898b5d54a54571e3b2890N.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 b7abf1fad5b898b5d54a54571e3b2890N.exe -
Loads dropped DLL 1 IoCs
pid Process 624 b7abf1fad5b898b5d54a54571e3b2890N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 3 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7abf1fad5b898b5d54a54571e3b2890N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7abf1fad5b898b5d54a54571e3b2890N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 b7abf1fad5b898b5d54a54571e3b2890N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 624 b7abf1fad5b898b5d54a54571e3b2890N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1960 b7abf1fad5b898b5d54a54571e3b2890N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 624 wrote to memory of 1960 624 b7abf1fad5b898b5d54a54571e3b2890N.exe 31 PID 624 wrote to memory of 1960 624 b7abf1fad5b898b5d54a54571e3b2890N.exe 31 PID 624 wrote to memory of 1960 624 b7abf1fad5b898b5d54a54571e3b2890N.exe 31 PID 624 wrote to memory of 1960 624 b7abf1fad5b898b5d54a54571e3b2890N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exe"C:\Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exeC:\Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1960
-
Network
-
Remote address:8.8.8.8:53Requestpastebin.comIN AResponsepastebin.comIN A104.20.4.235pastebin.comIN A104.20.3.235pastebin.comIN A172.67.19.24
-
Remote address:104.20.4.235:443RequestGET /raw/AqndxJKK HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Host: pastebin.com
Cache-Control: no-cache
ResponseHTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
x-frame-options: DENY
x-frame-options: DENY
x-content-type-options: nosniff
x-content-type-options: nosniff
x-xss-protection: 1;mode=block
x-xss-protection: 1;mode=block
cache-control: public, max-age=1801
CF-Cache-Status: EXPIRED
Server: cloudflare
CF-RAY: 8b6efed2aa450691-LHR
-
Remote address:8.8.8.8:53Requestc.pki.googIN AResponsec.pki.googIN CNAMEpki-goog.l.google.compki-goog.l.google.comIN A216.58.214.163
-
Remote address:216.58.214.163:80RequestGET /r/gsr1.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: c.pki.goog
ResponseHTTP/1.1 200 OK
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
Content-Length: 1739
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Thu, 22 Aug 2024 00:27:18 GMT
Expires: Thu, 22 Aug 2024 01:17:18 GMT
Cache-Control: public, max-age=3000
Age: 2716
Last-Modified: Mon, 08 Jul 2024 07:38:00 GMT
Content-Type: application/pkix-crl
Vary: Accept-Encoding
-
Remote address:216.58.214.163:80RequestGET /r/r4.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: c.pki.goog
ResponseHTTP/1.1 200 OK
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
Content-Length: 436
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Thu, 22 Aug 2024 00:29:28 GMT
Expires: Thu, 22 Aug 2024 01:19:28 GMT
Cache-Control: public, max-age=3000
Age: 2586
Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
Content-Type: application/pkix-crl
Vary: Accept-Encoding
-
1.0kB 4.5kB 9 9
HTTP Request
GET https://pastebin.com/raw/AqndxJKKHTTP Response
404 -
818 B 5.1kB 10 7
HTTP Request
GET http://c.pki.goog/r/gsr1.crlHTTP Response
200HTTP Request
GET http://c.pki.goog/r/r4.crlHTTP Response
200
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5a3e8d868361dbf6bb0fe441efbb95bd5
SHA1a9aa51fc789f337d20a9f2dc86d10f0a7eb1247f
SHA2562f213b408a6f0160ac488960bf38df052c418c84163439b0d96a0ecc1b5e298e
SHA51278c0b1f7e2bdf61c8efe35a8095667af857a009d8d56f2c566fec1eb81223bd0b99e1a8f28cfa984f19b8ec58d846023fb3fa4b742d90328dbc45615faf21f9f