Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
81s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe
Resource
win7-20240704-en
General
-
Target
2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe
-
Size
3.0MB
-
MD5
4aed7b49f4896bb7d95648eff3ecde3e
-
SHA1
7f8cf0ca4e421c5f47dfd7509d99b8b7734bdbe4
-
SHA256
2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d
-
SHA512
f1906764e8bb487785fb014f25145408d09605fa0188c0ff27ba8d66593225bbe669f6ea576dcfe700a2e8ba6271e45c78a6948d4996a71a2fcd7b2dc4f51ff8
-
SSDEEP
49152:9RefbRq+svmn5ZEzj3hbG9WDwAFSgrQRAqlqbqzNqAPdjpL:fefb4+qmn4z1bG9ES8QqMjpL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1560 1916 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1560 1916 2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe 30 PID 1916 wrote to memory of 1560 1916 2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe 30 PID 1916 wrote to memory of 1560 1916 2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe 30 PID 1916 wrote to memory of 1560 1916 2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe"C:\Users\Admin\AppData\Local\Temp\2de382152f087a86363e204faaa6f9105ecd57a64bc6a3633e6645e2ce3efd9d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 2602⤵
- Program crash
PID:1560
-