Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
71de7e22166b54d7dc8774403a7fad80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
71de7e22166b54d7dc8774403a7fad80N.exe
Resource
win10v2004-20240802-en
General
-
Target
71de7e22166b54d7dc8774403a7fad80N.exe
-
Size
1.2MB
-
MD5
71de7e22166b54d7dc8774403a7fad80
-
SHA1
b647b246910f56a7d67255ede444bdaca7ee332c
-
SHA256
7e30f74679f5013327e5edbad28f3997333a48a3ad6883b5f794d856c4e06823
-
SHA512
924ace796480f540367e6a675575454f3c4ccb5690517f02e4c3284c3df7e84863313767664b999e27444a17233177f4569811ebead6e8b931e196d3d10ea851
-
SSDEEP
24576:TaxaktqcjdqoZRXzszhYia1GLZmN1DUZmSordfq6Ph2kkkkK4kXkkkkkkkkA:Taxakt9q6Xzsfa1CZmXYZmSadfqX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2536 D74C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2536 D74C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2560 71de7e22166b54d7dc8774403a7fad80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71de7e22166b54d7dc8774403a7fad80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D74C.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2536 2560 71de7e22166b54d7dc8774403a7fad80N.exe 30 PID 2560 wrote to memory of 2536 2560 71de7e22166b54d7dc8774403a7fad80N.exe 30 PID 2560 wrote to memory of 2536 2560 71de7e22166b54d7dc8774403a7fad80N.exe 30 PID 2560 wrote to memory of 2536 2560 71de7e22166b54d7dc8774403a7fad80N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\71de7e22166b54d7dc8774403a7fad80N.exe"C:\Users\Admin\AppData\Local\Temp\71de7e22166b54d7dc8774403a7fad80N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\D74C.tmp"C:\Users\Admin\AppData\Local\Temp\D74C.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50700079fffa1cd91473d05a2fcf3084c
SHA1421f9fcad85edc63b437d9373f23687df297bdd6
SHA256e45c110f582dc1cf9eb75cd451d9f53d0caba936b381aa5acd07504e2f6f2767
SHA5122bef56aac1634ca8db0ba00c538f807695f37bf252cf4ebea88a8f15971c476d79fad20a09ee8b061b345336f5f1cfc1b05f39135c2910f6aceca8667191add7