Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
DHL9407155789.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DHL9407155789.exe
Resource
win10v2004-20240802-en
General
-
Target
DHL9407155789.exe
-
Size
845KB
-
MD5
e995ed0c5f64dc6e88685b700caf1e66
-
SHA1
9201951748fb091189c71e1071aa837a8d98c501
-
SHA256
4d58596777616fe9fbb75aef8c3ef57688cb3bab97d8690c850b57a12a84ba5d
-
SHA512
202ed5081268af6c833ac336eef5efa743859e2c9323358836c3fafce4992a1989d93b3279aff90fce38acf8391c5bf4b77a4ce0df5526e2aa06cf7546c2dcce
-
SSDEEP
24576:F/jV/sVIE8t59jPRlPE+NX8Z4kctQKtG89GEv:JjVwa59jZRZ2CJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL9407155789.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1864 DHL9407155789.exe 1864 DHL9407155789.exe 1864 DHL9407155789.exe 1864 DHL9407155789.exe 1864 DHL9407155789.exe 1864 DHL9407155789.exe 1864 DHL9407155789.exe 1864 DHL9407155789.exe 1864 DHL9407155789.exe 1864 DHL9407155789.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1864 DHL9407155789.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2976 1864 DHL9407155789.exe 31 PID 1864 wrote to memory of 2976 1864 DHL9407155789.exe 31 PID 1864 wrote to memory of 2976 1864 DHL9407155789.exe 31 PID 1864 wrote to memory of 2976 1864 DHL9407155789.exe 31 PID 1864 wrote to memory of 2720 1864 DHL9407155789.exe 32 PID 1864 wrote to memory of 2720 1864 DHL9407155789.exe 32 PID 1864 wrote to memory of 2720 1864 DHL9407155789.exe 32 PID 1864 wrote to memory of 2720 1864 DHL9407155789.exe 32 PID 1864 wrote to memory of 2616 1864 DHL9407155789.exe 33 PID 1864 wrote to memory of 2616 1864 DHL9407155789.exe 33 PID 1864 wrote to memory of 2616 1864 DHL9407155789.exe 33 PID 1864 wrote to memory of 2616 1864 DHL9407155789.exe 33 PID 1864 wrote to memory of 2240 1864 DHL9407155789.exe 34 PID 1864 wrote to memory of 2240 1864 DHL9407155789.exe 34 PID 1864 wrote to memory of 2240 1864 DHL9407155789.exe 34 PID 1864 wrote to memory of 2240 1864 DHL9407155789.exe 34 PID 1864 wrote to memory of 3060 1864 DHL9407155789.exe 35 PID 1864 wrote to memory of 3060 1864 DHL9407155789.exe 35 PID 1864 wrote to memory of 3060 1864 DHL9407155789.exe 35 PID 1864 wrote to memory of 3060 1864 DHL9407155789.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"2⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"2⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"2⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"2⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"2⤵PID:3060
-