Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
44d8e99d2d87b8400588b58f370d59f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44d8e99d2d87b8400588b58f370d59f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
44d8e99d2d87b8400588b58f370d59f0N.exe
-
Size
220KB
-
MD5
44d8e99d2d87b8400588b58f370d59f0
-
SHA1
9791947e3a6171b65c4bf3327cd135895a19d5a8
-
SHA256
1db87e480bd4bfdf3fa5e856972f85b2fd8fc688cd3a0c146041016e4e83e7e5
-
SHA512
3bc3b15f0a09c55a8447f3ab8714c2dd0b05caf8419985605caaa468d6eb1c65d0d2fb5fe1607785bb5b72cdf6bf6bec96477c6cb6ff1434ef65f11a7bbcb307
-
SSDEEP
3072:w18Gs+C11XB4TqtTEI506wcIYKFbJaDMKvi8OLa3eSUzJI1s4t2TxKPC9KBpql+m:w1jMrqwTyBYEqNOKeLNI1Rt2sPC9KrVC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2304 44d8e99d2d87b8400588b58f370d59f0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 44d8e99d2d87b8400588b58f370d59f0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 44d8e99d2d87b8400588b58f370d59f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44d8e99d2d87b8400588b58f370d59f0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2224 44d8e99d2d87b8400588b58f370d59f0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2304 44d8e99d2d87b8400588b58f370d59f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2304 2224 44d8e99d2d87b8400588b58f370d59f0N.exe 29 PID 2224 wrote to memory of 2304 2224 44d8e99d2d87b8400588b58f370d59f0N.exe 29 PID 2224 wrote to memory of 2304 2224 44d8e99d2d87b8400588b58f370d59f0N.exe 29 PID 2224 wrote to memory of 2304 2224 44d8e99d2d87b8400588b58f370d59f0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d8e99d2d87b8400588b58f370d59f0N.exe"C:\Users\Admin\AppData\Local\Temp\44d8e99d2d87b8400588b58f370d59f0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\44d8e99d2d87b8400588b58f370d59f0N.exeC:\Users\Admin\AppData\Local\Temp\44d8e99d2d87b8400588b58f370d59f0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5ce4648d95fa86b325b972be6c2d9933a
SHA1a78bbebefa993d1d5ac8c8449863d5125a6a1b70
SHA256a49a59ba0cd3f89862b72c330a869661772d909d16993fdf0ad63e452e74eeb8
SHA5128a32895bc367ff137dbb626d9d5520c79cf636f551c1cc4a541414b9ebafbc98419d5248c5fc321c5da410df02de1f7857b7eab8aff5d9786b64ba9c872bbf9f