Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
73ea745164e0995ae30155a01a409570N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73ea745164e0995ae30155a01a409570N.exe
Resource
win10v2004-20240802-en
General
-
Target
73ea745164e0995ae30155a01a409570N.exe
-
Size
93KB
-
MD5
73ea745164e0995ae30155a01a409570
-
SHA1
0024f29f5e209e46522794d3c10d599c379e0c2e
-
SHA256
291eb172f7e99c5610e64b598b80ad8b809668008f37d0b88907b20689662dc6
-
SHA512
06d9b8411aea55d5d94a1df06c3524412fa661285a2988476725a0d41100240d1e9b17053834390c13feeb1b5c242d1560c9717a55eb392b98e18b2f1f1324e0
-
SSDEEP
1536:lARFqvxZZ5OBx9aRfeM2ZMqUy+iZCdcHHPm91fGLL7s2XQhxAj6Ie5O:SRFqvxkMeM2SqrvCdT9eL7sdhxJd5O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 73ea745164e0995ae30155a01a409570N.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 73ea745164e0995ae30155a01a409570N.exe -
Loads dropped DLL 1 IoCs
pid Process 2744 73ea745164e0995ae30155a01a409570N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73ea745164e0995ae30155a01a409570N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2744 73ea745164e0995ae30155a01a409570N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2744 73ea745164e0995ae30155a01a409570N.exe 2660 73ea745164e0995ae30155a01a409570N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2660 2744 73ea745164e0995ae30155a01a409570N.exe 31 PID 2744 wrote to memory of 2660 2744 73ea745164e0995ae30155a01a409570N.exe 31 PID 2744 wrote to memory of 2660 2744 73ea745164e0995ae30155a01a409570N.exe 31 PID 2744 wrote to memory of 2660 2744 73ea745164e0995ae30155a01a409570N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\73ea745164e0995ae30155a01a409570N.exe"C:\Users\Admin\AppData\Local\Temp\73ea745164e0995ae30155a01a409570N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\73ea745164e0995ae30155a01a409570N.exeC:\Users\Admin\AppData\Local\Temp\73ea745164e0995ae30155a01a409570N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD521baab87bdc7eb328388b2bfea252615
SHA194886fc8ba986652572fe520b907d6dada48a347
SHA256e70a1ffa7bf4028704dc2b6457e734e14004a8d2c7bce484bc2c88094e3971c9
SHA512569c851b21c63ee020f63386a532bc674d4d4c7c88228b533504d9967822f9e9d5b99bcd8727ae096764e2c77344b59c465c8ec0677778bbe895415123d55d6e