Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
f6ab17b0d64817b6b8a692606a7abd90N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f6ab17b0d64817b6b8a692606a7abd90N.exe
Resource
win10v2004-20240802-en
General
-
Target
f6ab17b0d64817b6b8a692606a7abd90N.exe
-
Size
512KB
-
MD5
f6ab17b0d64817b6b8a692606a7abd90
-
SHA1
047770fddd6b3077bcb66e3c00d3c7d517fcc81b
-
SHA256
001c6b123d0ae6a0094635a2be4c7934c4acb04e4ef3b5947c702255f26f982d
-
SHA512
7358fa82a75f254644087180d1198bc89dace7d89eed6b7e2e33c14ca0b7d12f77da3259a96d5a3e92641570ac136433b7869d983a2285b0865b155c99baa0a4
-
SSDEEP
12288:S5DHplDngk0npM4dl0v5JHpS0wULVnMhysQ:S57ngkEM4dmv5Xf+E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2904 f6ab17b0d64817b6b8a692606a7abd90N.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 f6ab17b0d64817b6b8a692606a7abd90N.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 f6ab17b0d64817b6b8a692606a7abd90N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6ab17b0d64817b6b8a692606a7abd90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6ab17b0d64817b6b8a692606a7abd90N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2904 f6ab17b0d64817b6b8a692606a7abd90N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2880 f6ab17b0d64817b6b8a692606a7abd90N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2904 f6ab17b0d64817b6b8a692606a7abd90N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2904 2880 f6ab17b0d64817b6b8a692606a7abd90N.exe 30 PID 2880 wrote to memory of 2904 2880 f6ab17b0d64817b6b8a692606a7abd90N.exe 30 PID 2880 wrote to memory of 2904 2880 f6ab17b0d64817b6b8a692606a7abd90N.exe 30 PID 2880 wrote to memory of 2904 2880 f6ab17b0d64817b6b8a692606a7abd90N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6ab17b0d64817b6b8a692606a7abd90N.exe"C:\Users\Admin\AppData\Local\Temp\f6ab17b0d64817b6b8a692606a7abd90N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\f6ab17b0d64817b6b8a692606a7abd90N.exeC:\Users\Admin\AppData\Local\Temp\f6ab17b0d64817b6b8a692606a7abd90N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5754fa3ddb15050ca2a5d222fd3d19b09
SHA1365bfe543c0dbb1ac19c21296e7b562094d83e50
SHA2561310e64ae83f070c8b5aa97afae7206971cfe9dd1b6cf94c6ec492bed2f3e8c1
SHA51260c6227417d56403b608ef13cb0c3f36883feb8c246ccfad022b9719603dcb31491c6ee777d6f79df08db0555bf0960e4a28c27734c07f58509a9694810933bf