Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
807ad2661b45960e1d9dedd6fcb816e0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
807ad2661b45960e1d9dedd6fcb816e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
807ad2661b45960e1d9dedd6fcb816e0N.exe
-
Size
1.2MB
-
MD5
807ad2661b45960e1d9dedd6fcb816e0
-
SHA1
974c6fcdc14d3b0d7f8b883700958e8795e29564
-
SHA256
7e25ae929cbe78c28594fd7c220b424c9eed31996c4b0c123b6399c449a80cc2
-
SHA512
180d8c58625a75db80ad620ab3ac14b897b8ebad342cd9de788e74729e0bb34fdb90a25698aa9c6b6d972cf970152e61b46aa63533d4e05fccdead077f04dd31
-
SSDEEP
12288:4m2IW5PXw9N94+uWD1qBbKR0dk08/jVDa/ZSC+gRHnhvMCtjW:4Vgz4+uWD840dk9a/ZSC+gVueC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 807ad2661b45960e1d9dedd6fcb816e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 807ad2661b45960e1d9dedd6fcb816e0N.exe -
Loads dropped DLL 4 IoCs
pid Process 2716 807ad2661b45960e1d9dedd6fcb816e0N.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2128 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 807ad2661b45960e1d9dedd6fcb816e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 807ad2661b45960e1d9dedd6fcb816e0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2716 807ad2661b45960e1d9dedd6fcb816e0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2128 807ad2661b45960e1d9dedd6fcb816e0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2128 2716 807ad2661b45960e1d9dedd6fcb816e0N.exe 31 PID 2716 wrote to memory of 2128 2716 807ad2661b45960e1d9dedd6fcb816e0N.exe 31 PID 2716 wrote to memory of 2128 2716 807ad2661b45960e1d9dedd6fcb816e0N.exe 31 PID 2716 wrote to memory of 2128 2716 807ad2661b45960e1d9dedd6fcb816e0N.exe 31 PID 2128 wrote to memory of 2744 2128 807ad2661b45960e1d9dedd6fcb816e0N.exe 32 PID 2128 wrote to memory of 2744 2128 807ad2661b45960e1d9dedd6fcb816e0N.exe 32 PID 2128 wrote to memory of 2744 2128 807ad2661b45960e1d9dedd6fcb816e0N.exe 32 PID 2128 wrote to memory of 2744 2128 807ad2661b45960e1d9dedd6fcb816e0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\807ad2661b45960e1d9dedd6fcb816e0N.exe"C:\Users\Admin\AppData\Local\Temp\807ad2661b45960e1d9dedd6fcb816e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\807ad2661b45960e1d9dedd6fcb816e0N.exeC:\Users\Admin\AppData\Local\Temp\807ad2661b45960e1d9dedd6fcb816e0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a5b8b97956fd39b01e2a425fb2e480e1
SHA15af2ec66feaaccd5ccbec33dd3a8c4e6c4ad03e5
SHA256cdfa1ae3957e11db95832c8be5650eeb677c82968c685efc044a82a276b4f27a
SHA5123b2f0ed960a84c6a63923c4796da9a432530bef86e5cde32cf8577d2250e8d9088b4590a24b35238fa4d6e3fd998bab826c7ed30e0ad507b471a893693bd5e15