Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
4722dd6ceff105a579d67e63f5402660N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4722dd6ceff105a579d67e63f5402660N.exe
Resource
win10v2004-20240802-en
General
-
Target
4722dd6ceff105a579d67e63f5402660N.exe
-
Size
256KB
-
MD5
4722dd6ceff105a579d67e63f5402660
-
SHA1
b92f8c72ef084be7cca1328d2a09cb2200a0c3e1
-
SHA256
6b47be6b825c54b9d01b3a283b96a752df3cd26ee856d3971911153902925fbd
-
SHA512
69585e8924fb9bd29e6a275d1afd368865a36dfb6acfc8f09b1532fba3aa5d31b895037cac99bdd88b096535f6b2107e3bba9efa578c4ebc16ee9ce6aebb3568
-
SSDEEP
6144:DcHDq7bXdhavxdjUccBucIgQfieWdDJboY4sJ8:DcHOLYxFUZRI9fie6D9d8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2796 4722dd6ceff105a579d67e63f5402660N.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 4722dd6ceff105a579d67e63f5402660N.exe -
Loads dropped DLL 1 IoCs
pid Process 2636 4722dd6ceff105a579d67e63f5402660N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4722dd6ceff105a579d67e63f5402660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4722dd6ceff105a579d67e63f5402660N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2796 4722dd6ceff105a579d67e63f5402660N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2636 4722dd6ceff105a579d67e63f5402660N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2796 4722dd6ceff105a579d67e63f5402660N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2796 2636 4722dd6ceff105a579d67e63f5402660N.exe 30 PID 2636 wrote to memory of 2796 2636 4722dd6ceff105a579d67e63f5402660N.exe 30 PID 2636 wrote to memory of 2796 2636 4722dd6ceff105a579d67e63f5402660N.exe 30 PID 2636 wrote to memory of 2796 2636 4722dd6ceff105a579d67e63f5402660N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4722dd6ceff105a579d67e63f5402660N.exe"C:\Users\Admin\AppData\Local\Temp\4722dd6ceff105a579d67e63f5402660N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\4722dd6ceff105a579d67e63f5402660N.exeC:\Users\Admin\AppData\Local\Temp\4722dd6ceff105a579d67e63f5402660N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5d713c0b6a8ae0d668419c933e95e5eef
SHA13cf08837a1298c80581a833211c28637dcc7faa4
SHA25607a9bc02d26d0536655872b88e8af33d802634b998cf709d2d1ea45cc6d61421
SHA512cf5c2cf799db78f272a0ad5ede3c14858461cd1306269f6f9edd20f0f6c0230976b03ebed8673e329afa67ebab1fb1ab13c54501cce9907e2a5071b554906ea5