Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
4ffd82313904fcc25c38c9427898bb20N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ffd82313904fcc25c38c9427898bb20N.exe
Resource
win10v2004-20240802-en
General
-
Target
4ffd82313904fcc25c38c9427898bb20N.exe
-
Size
282KB
-
MD5
4ffd82313904fcc25c38c9427898bb20
-
SHA1
657bb6372559458921a6626f8edf094215452ec0
-
SHA256
eab56657a10cc857cba066dfd7b95b162d42a674baf00a8d3a97ba1ff001e05f
-
SHA512
f9ddd7984c65de5c57b9acbcb49737d5d6bc0f95fa142673fb9bf33ba23c703f28431ac85937a65bc70d97b83952a9798bf924b0499165322223ff6b78a15ed3
-
SSDEEP
6144:3KtQXqJ2jusPxe2ZSHrvpO4tkEjiPISUOgW9X+hOGzC/:6toqs822r4CkmZzcukG2/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2656 WSNCQF.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\WSNCQF.exe 4ffd82313904fcc25c38c9427898bb20N.exe File opened for modification C:\windows\WSNCQF.exe 4ffd82313904fcc25c38c9427898bb20N.exe File created C:\windows\WSNCQF.exe.bat 4ffd82313904fcc25c38c9427898bb20N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ffd82313904fcc25c38c9427898bb20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WSNCQF.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 4ffd82313904fcc25c38c9427898bb20N.exe 2656 WSNCQF.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2596 4ffd82313904fcc25c38c9427898bb20N.exe 2596 4ffd82313904fcc25c38c9427898bb20N.exe 2656 WSNCQF.exe 2656 WSNCQF.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2736 2596 4ffd82313904fcc25c38c9427898bb20N.exe 30 PID 2596 wrote to memory of 2736 2596 4ffd82313904fcc25c38c9427898bb20N.exe 30 PID 2596 wrote to memory of 2736 2596 4ffd82313904fcc25c38c9427898bb20N.exe 30 PID 2596 wrote to memory of 2736 2596 4ffd82313904fcc25c38c9427898bb20N.exe 30 PID 2736 wrote to memory of 2656 2736 cmd.exe 32 PID 2736 wrote to memory of 2656 2736 cmd.exe 32 PID 2736 wrote to memory of 2656 2736 cmd.exe 32 PID 2736 wrote to memory of 2656 2736 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ffd82313904fcc25c38c9427898bb20N.exe"C:\Users\Admin\AppData\Local\Temp\4ffd82313904fcc25c38c9427898bb20N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\WSNCQF.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\windows\WSNCQF.exeC:\windows\WSNCQF.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD52b8a33e1bef7c0e994fed573d6cef34e
SHA1d6f7410fa0356dec87e38fe63554720d62746dc3
SHA256c788606c2d985b670a05dcadd887e62cb01feab530f820b6b0e8b32961424158
SHA51238ed146ef42a967a5e247e05776791f238ff03c97d1821a3f0bf26b758322686737f13d2c6b40455d8047a1238dd95c539fa60940fc64a0a6811a069c6d38349
-
Filesize
282KB
MD5e76693c44cd590e1b07789aedcc7cce0
SHA11f6c9c29dee0cb8a22492e16607baf2d5e7cd1c5
SHA256c124c24cf86eb0dc6427e4186decb6547b3e386b031aec99f5986722a9341db5
SHA51237e492c85efbf199a93d8f0602c09eb5d0707dd0838a68917098baacbde991e018f09c76ec2fef317a23f4df12fa70455008f2b2ded966d1124e75a009707bc5