Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
5f967342f670b09f2e0c107e150f43e0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5f967342f670b09f2e0c107e150f43e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5f967342f670b09f2e0c107e150f43e0N.exe
-
Size
256KB
-
MD5
5f967342f670b09f2e0c107e150f43e0
-
SHA1
10f25240f52807eb848fddd965f1d621184fc60b
-
SHA256
fb92e5dedbcab6e5dde64a240a27b26a550be75f702cc387d8861d0d60f462ab
-
SHA512
4eb1bb70ab708545f3321bd1f41bfaf56b08121d3a691883183479923d372fee6784584c37886c8ee0b7bd2accd10a488867c0ace4f709e19ed2aeb73eed62a4
-
SSDEEP
6144:Z2vfy7/4/pSgCi7nK6Uka79H0W7cyqCxSng7:ZYy7YSgp707j0nk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2456 5f967342f670b09f2e0c107e150f43e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2456 5f967342f670b09f2e0c107e150f43e0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 5f967342f670b09f2e0c107e150f43e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f967342f670b09f2e0c107e150f43e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f967342f670b09f2e0c107e150f43e0N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2456 5f967342f670b09f2e0c107e150f43e0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2488 5f967342f670b09f2e0c107e150f43e0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2456 5f967342f670b09f2e0c107e150f43e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2456 2488 5f967342f670b09f2e0c107e150f43e0N.exe 31 PID 2488 wrote to memory of 2456 2488 5f967342f670b09f2e0c107e150f43e0N.exe 31 PID 2488 wrote to memory of 2456 2488 5f967342f670b09f2e0c107e150f43e0N.exe 31 PID 2488 wrote to memory of 2456 2488 5f967342f670b09f2e0c107e150f43e0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe"C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exeC:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD52d100d01df92cd21a61c358062fa4763
SHA1000727d81fa3df77cf3045625231b03493bda6c7
SHA256e6c10f716a97305c96519e2383c764e99b3afbf806763393e30a3749feef3dcd
SHA51297db90c5e853da8b46653279e7ec887da241a76754d0f6c4b573b97bca415fbcd4dacc722e0d2d0505328370f54e8c0a579e296eda69bfc2d7047c0358c001df