Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 23:41

General

  • Target

    f1b606306771a58b05e1857d7413bdb0N.exe

  • Size

    37KB

  • MD5

    f1b606306771a58b05e1857d7413bdb0

  • SHA1

    9a9cb24166a300b16e048aa0dadafa4458346c4f

  • SHA256

    4e23adc37a7481804051277947385aa1363c423658fd3fcf734ebc556301390a

  • SHA512

    f1d8b0c029b107078ff480e7b82bdeacf0695b1706b751e6ba67970be0faaae3660f0f0caffb4aa943cd164d3ad9f8d803e61a0d5f5c6b5bff20b786163e7302

  • SSDEEP

    768:NElU5ekGkYN1rUC8Mg8NPdIkKMoQQ9CCRnxE+iY:OlJkGkC4cge1I1QQwCRas

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1b606306771a58b05e1857d7413bdb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f1b606306771a58b05e1857d7413bdb0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" "::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{21EC2020-3AEA-1069-A2DD-08002B30309D}"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:280
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    PID:2080
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1864-0-0x0000000001000000-0x000000000100B000-memory.dmp

    Filesize

    44KB

  • memory/1864-1-0x0000000001000000-0x000000000100B000-memory.dmp

    Filesize

    44KB