Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe
Resource
win10v2004-20240802-en
General
-
Target
aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe
-
Size
1.2MB
-
MD5
77f8da00f3632972d585ff7efb0bea8c
-
SHA1
987ce549f5b8bb619bd78e5f88ae3cd132bb8f34
-
SHA256
aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9
-
SHA512
5b18f05dcb866aad05c25f792f3646c75444a3daf7abb52b2b5331c2a6764c9affea90735d0061d615f0a2c55226262d08b59c98c3c7cbe44528c621fd1fac16
-
SSDEEP
24576:fqDEvCTbMWu7rQYlBQcBiT6rprG8aEnfOYbNoY5cap:fTvC/MTQYxsWR7aEfOYbNs
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2756 set thread context of 2928 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 30 PID 2928 set thread context of 1232 2928 svchost.exe 21 PID 2928 set thread context of 528 2928 svchost.exe 32 PID 528 set thread context of 1232 528 clip.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clip.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 2928 svchost.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe 528 clip.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 2928 svchost.exe 1232 Explorer.EXE 1232 Explorer.EXE 528 clip.exe 528 clip.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2928 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 30 PID 2756 wrote to memory of 2928 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 30 PID 2756 wrote to memory of 2928 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 30 PID 2756 wrote to memory of 2928 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 30 PID 2756 wrote to memory of 2928 2756 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 30 PID 1232 wrote to memory of 528 1232 Explorer.EXE 32 PID 1232 wrote to memory of 528 1232 Explorer.EXE 32 PID 1232 wrote to memory of 528 1232 Explorer.EXE 32 PID 1232 wrote to memory of 528 1232 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe"C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2928
-
-
-
C:\Windows\SysWOW64\clip.exe"C:\Windows\SysWOW64\clip.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD581d057b1ac360dd8069e3f2bd4733088
SHA10fa44cb9a89c387909409c7f4c4e1fe16522b572
SHA25683bf3620fbe8c97f5df54a87fad458c0cac9cf30162e7e4e474398fb980ca667
SHA51217f04d2c81713ff251469fb383988b34c5bf2538d686a7ff2809bf950a608752fc4205d60daad552935eee87ceb40a7e71b92fa93eba351515a136eacefe6414