Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe
Resource
win10v2004-20240802-en
General
-
Target
182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe
-
Size
576KB
-
MD5
8c76b929ddab15068a9ac089fded0f81
-
SHA1
b222afc7e6c4473a624d140d6b6f7abacb4713a7
-
SHA256
182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c
-
SHA512
9c3c240f275be257b8f5fddf173f9ee562b3a41c75ff499d84623eb78bb08bbc4de06744cd267eb371a5a7c939e0902522deca8d85c9c5d63c3cd5f8609d5ec9
-
SSDEEP
12288:sYIW0p98Oh8P7h8IGLbPC3YaBeZmj/Kvo/u:gW298E8u/LbKIiUmj/Kvo/u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 E782.tmp -
Loads dropped DLL 1 IoCs
pid Process 2772 182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E782.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2812 E782.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2888 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2812 E782.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2812 2772 182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe 31 PID 2772 wrote to memory of 2812 2772 182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe 31 PID 2772 wrote to memory of 2812 2772 182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe 31 PID 2772 wrote to memory of 2812 2772 182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe 31 PID 2812 wrote to memory of 2888 2812 E782.tmp 32 PID 2812 wrote to memory of 2888 2812 E782.tmp 32 PID 2812 wrote to memory of 2888 2812 E782.tmp 32 PID 2812 wrote to memory of 2888 2812 E782.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe"C:\Users\Admin\AppData\Local\Temp\182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\E782.tmp"C:\Users\Admin\AppData\Local\Temp\E782.tmp" --pingC:\Users\Admin\AppData\Local\Temp\182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.exe D759C537D48BB7A4FD4258F60347315B648662EC998742E2D3E120220AA881376B336C7F7072A7489F17830D694F887FDFE8398AD5425F19918F16AA484B7D192⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\182fa8751291fab0c72a7634e8c7456410a3a4ac6dbbd17ffe6af30d4d52124c.docx
Filesize21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
576KB
MD5d0b46d8aa16dee06a6ee0f8997a5e985
SHA18f77363230cee682f03c0cd817229a0789997c30
SHA2569111e6823cdd58cc2f506348611db3401deac65f4bddc182fd2c14e906d236c1
SHA512709d4455608e8bfcc75020205b8973595abbdec59a52818f7ca4e7fbdae5f4dcc83797c745658e5037532fd1502388b87d9b6a6030e06238a716c0395c766401