Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
3345e3d28364c1d9704768c8d900cd00N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3345e3d28364c1d9704768c8d900cd00N.exe
Resource
win10v2004-20240802-en
General
-
Target
3345e3d28364c1d9704768c8d900cd00N.exe
-
Size
1.4MB
-
MD5
3345e3d28364c1d9704768c8d900cd00
-
SHA1
eb474b0236488c50305e318ab7f82e5d86b4214e
-
SHA256
a9a3f15f17780e40578c3c344825fa8738f2231aa4f167793abddb2d1d96f51f
-
SHA512
bcd16ca277ed6015b7c0abba4b0ef0e2e3200067e796f6f2d159e65ed54e476fae71c9339c8fcff1b9949ea6d7b66a88ca5c3d7f22bf6ac42120e544493f16d3
-
SSDEEP
24576:AaQqNqgNMu8zSnnUgV33d0d25QDLzQQ6sC1VZyM9:AajNJSLMjnSHklsM9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2688 ~03m2sivsp1.tmp -
Loads dropped DLL 1 IoCs
pid Process 2672 3345e3d28364c1d9704768c8d900cd00N.exe -
Use of msiexec (install) with remote resource 1 IoCs
pid Process 2716 MSIEXEC.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3345e3d28364c1d9704768c8d900cd00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~03m2sivsp1.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIEXEC.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2716 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 2716 MSIEXEC.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2716 MSIEXEC.EXE 2716 MSIEXEC.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2688 2672 3345e3d28364c1d9704768c8d900cd00N.exe 30 PID 2672 wrote to memory of 2688 2672 3345e3d28364c1d9704768c8d900cd00N.exe 30 PID 2672 wrote to memory of 2688 2672 3345e3d28364c1d9704768c8d900cd00N.exe 30 PID 2672 wrote to memory of 2688 2672 3345e3d28364c1d9704768c8d900cd00N.exe 30 PID 2672 wrote to memory of 2688 2672 3345e3d28364c1d9704768c8d900cd00N.exe 30 PID 2672 wrote to memory of 2688 2672 3345e3d28364c1d9704768c8d900cd00N.exe 30 PID 2672 wrote to memory of 2688 2672 3345e3d28364c1d9704768c8d900cd00N.exe 30 PID 2688 wrote to memory of 2716 2688 ~03m2sivsp1.tmp 31 PID 2688 wrote to memory of 2716 2688 ~03m2sivsp1.tmp 31 PID 2688 wrote to memory of 2716 2688 ~03m2sivsp1.tmp 31 PID 2688 wrote to memory of 2716 2688 ~03m2sivsp1.tmp 31 PID 2688 wrote to memory of 2716 2688 ~03m2sivsp1.tmp 31 PID 2688 wrote to memory of 2716 2688 ~03m2sivsp1.tmp 31 PID 2688 wrote to memory of 2716 2688 ~03m2sivsp1.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3345e3d28364c1d9704768c8d900cd00N.exe"C:\Users\Admin\AppData\Local\Temp\3345e3d28364c1d9704768c8d900cd00N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\~03m2sivsp1.tmp"C:\Users\Admin\AppData\Local\Temp\~03m2sivsp1.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\MSIEXEC.EXEMSIEXEC.EXE /i "http://pliuht.cdnpckgs.eu/client/pkgs/virtual/Virtual Casino20171209041515.msi" DDC_DID=4951870 DDC_RTGURL=http://www.cdnfile.eu/dl/TrackSetup/TrackSetup.aspx?DID=4951870%26CASINONAME=virtualcasino DDC_UPDATESTATUSURL=http://190.4.94.37:8080/virtual/Lobby.WebServices/Installer.asmx DDC_SIGNUPURL=http://190.4.94.37:8080/virtual/Lobby.WebSite/SignUpUnsecure.aspx SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="~03m2sivsp1.tmp"3⤵
- Use of msiexec (install) with remote resource
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56efe8348bd3a9359d8343be0f548f68a
SHA157b54a6bcba02e575e229e473c421fa23261c6d7
SHA256d1d09f95c4396f22abb3fb6adf5cee21124c04c774ff40dce5dab3c21d88f720
SHA51224d2768430b5f5a80b64ab560d5c93f77f784e7cf79e408cef2300c6f386f8edd25234173c306e768374be128533d75c9de91be0585563ebd4426021273f2572
-
Filesize
21KB
MD5be345d0260ae12c5f2f337b17e07c217
SHA10976ba0982fe34f1c35a0974f6178e15c238ed7b
SHA256e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3
SHA51277040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff
-
Filesize
20B
MD5db9af7503f195df96593ac42d5519075
SHA11b487531bad10f77750b8a50aca48593379e5f56
SHA2560a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13
SHA5126839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b
-
Filesize
1.2MB
MD50aa5b466056f3d1d1a45c865733c9fcb
SHA1dc4761f8d4290ba510a367f1e5486ce4099a444a
SHA256774470cad648293e3e2b9533d080d651892b15ad84cc6123fe81e9ce38348e16
SHA512140bc40d21959678b4b8be4ce759cfc0e8837ee35d24fc4e40baa06d92fc9c157450796720628ad96ca160bca138dd72c4806bf09f90995ef3e312b890017741
-
Filesize
5KB
MD5975fa7c866caa86c06018ec4fab13d32
SHA114dee8979f6626d7f1e51939bf4db2ff53d8bac3
SHA25681460fa02e5bde6a4112743341670d23633ff827b20139fb87705718574ad2d6
SHA5126c489383777a2f88791f59a8e88a77d1efc1fefd9d338628f571dc180f235be622e667c50d2ceaa15092d5423377394a166a624bf900ceb219e1c05ab1e69dc7