Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe
Resource
win10v2004-20240802-en
General
-
Target
43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe
-
Size
1.9MB
-
MD5
a9e9711abf53dffaebdbe84c9a8bc88b
-
SHA1
bb896213fca90c7c1872af1dc3228693e3b27091
-
SHA256
43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871
-
SHA512
b9d52e0c5b70160696a6f23d1fabbd5921622b127c3681e3ed36cb4368a861e0126573562ec40d5eba65b4a519d6a74f170103a379a02e5c41f5041a2acbb78d
-
SSDEEP
49152:Qoa1taC070d+fslKRkisGuPTk5jsddKzZY:Qoa1taC0LfsBXPTk5jWENY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2456 197A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2456 197A.tmp -
Loads dropped DLL 1 IoCs
pid Process 2500 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 197A.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2456 2500 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 31 PID 2500 wrote to memory of 2456 2500 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 31 PID 2500 wrote to memory of 2456 2500 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 31 PID 2500 wrote to memory of 2456 2500 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe"C:\Users\Admin\AppData\Local\Temp\43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 5470A183B6399257B3A205AC716F7DA8ACE83B973B13713CD339E619E912A6DDBC676F33B6CD9D9F4BB3122F5B1589DBBAD2ABF4A6E85ED0259EFE9BE70A70382⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57d189fa2bffc2e41e05bfa1768029567
SHA1a4c9b7de457d7a094183ad0696012299f768721d
SHA256a294efd71bb8b0ec8d9872cfd93a05bca82cc38ad854ff39bbf0d7906eab11ea
SHA5126f6c101fcc381d1b7c3a469d0e7b12580523a545cd2e8b8fcbf03184b999fbf54f5401feda0e38294d1d3b3db19c982a69455604d751d2a188d022eed6cec700