Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
deb0299f10c1c5bc231249190e559300N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
deb0299f10c1c5bc231249190e559300N.exe
Resource
win10v2004-20240802-en
General
-
Target
deb0299f10c1c5bc231249190e559300N.exe
-
Size
2.3MB
-
MD5
deb0299f10c1c5bc231249190e559300
-
SHA1
83db4e7bfd398e9e778742a4cf98cb565e7b16e1
-
SHA256
01001674575a869cbeb9a9063aae82184d1621b49a34a4435600c6987ff104a0
-
SHA512
51bb77547f35b7f29934f3611e6f0dcccdff1999eced39a42188653de507b20aebff99269c21045057c0f5e9023b90860603573637bad1f43865fc5fe15a419f
-
SSDEEP
24576:6mrMjCIi2GVa/ZSkJovBYLYsSwdaJ+4h99Fm+ci2a/ZSrJovBY:6mraig+h7Q+F2g
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2140 deb0299f10c1c5bc231249190e559300N.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 deb0299f10c1c5bc231249190e559300N.exe -
Loads dropped DLL 4 IoCs
pid Process 2084 deb0299f10c1c5bc231249190e559300N.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2648 2140 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deb0299f10c1c5bc231249190e559300N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deb0299f10c1c5bc231249190e559300N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 deb0299f10c1c5bc231249190e559300N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2140 deb0299f10c1c5bc231249190e559300N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2140 2084 deb0299f10c1c5bc231249190e559300N.exe 31 PID 2084 wrote to memory of 2140 2084 deb0299f10c1c5bc231249190e559300N.exe 31 PID 2084 wrote to memory of 2140 2084 deb0299f10c1c5bc231249190e559300N.exe 31 PID 2084 wrote to memory of 2140 2084 deb0299f10c1c5bc231249190e559300N.exe 31 PID 2140 wrote to memory of 2648 2140 deb0299f10c1c5bc231249190e559300N.exe 32 PID 2140 wrote to memory of 2648 2140 deb0299f10c1c5bc231249190e559300N.exe 32 PID 2140 wrote to memory of 2648 2140 deb0299f10c1c5bc231249190e559300N.exe 32 PID 2140 wrote to memory of 2648 2140 deb0299f10c1c5bc231249190e559300N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\deb0299f10c1c5bc231249190e559300N.exe"C:\Users\Admin\AppData\Local\Temp\deb0299f10c1c5bc231249190e559300N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\deb0299f10c1c5bc231249190e559300N.exeC:\Users\Admin\AppData\Local\Temp\deb0299f10c1c5bc231249190e559300N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5f3bbf382aece5b840a9d68360185e04a
SHA1af049ee8b12370366a1ab7491c346ad9a2d22624
SHA256c3c22ae519d2c127b60b5b0a52d471244247f015bf2d66eea07a248fa21c182c
SHA512bdd5d0dd8b36685f8a4b92e979c9f4c5cf528e3a7f224d0e95c1ffc0417a64254b96ac453e4125302f2954962291b5e8dbce3d69fee29a1c8b9e5a3e8bb4d127