Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe
Resource
win10v2004-20240802-en
General
-
Target
5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe
-
Size
4.2MB
-
MD5
7bbcdf2e0aed9c52f8d8992e9d443d93
-
SHA1
9f6fd09739b5ec6103cff9919eb62eeaf1cef75c
-
SHA256
5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336
-
SHA512
101f4d331101d4481f660f7b4c837e5c46cb8a52832af71b218065f20ad67e6829ef7d7def9001b0e171a628064abf845386fa802fcf20e9efb718aacb3b4148
-
SSDEEP
98304:emhd1UryeoGq6BVChcuTdbYWVLUjH5oxFbxCVLUjH5oxFbx:elqOCh/TdbDVUjZEdCVUjZEd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1800 8E1C.tmp -
Loads dropped DLL 1 IoCs
pid Process 348 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8E1C.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 348 wrote to memory of 1800 348 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe 30 PID 348 wrote to memory of 1800 348 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe 30 PID 348 wrote to memory of 1800 348 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe 30 PID 348 wrote to memory of 1800 348 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe"C:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\8E1C.tmp"C:\Users\Admin\AppData\Local\Temp\8E1C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe 68201BF7B0A2B1AA41AD58B07A3C53610BE3F42296DD98587640074CB4A2A98E50EA760528710BDFDAE6A965E02EEC77FA851EB6D552A0DB5DBCFB222EDDAF442⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD59bca61eb2c48f48faa75e62689768ad1
SHA19f0bda6a2f71157ac9bc75923720922594d08a74
SHA2565a963948852f77ab54a808c9c075bcecb1607f5c0bc0256bea648fa8d2a81513
SHA512d6a7959a5db54939d2c2468b3783935735c91e4dbfb9c8f54d33e71699aa1f0bf46553a854204b078cc800b16da954558272c4d732616bbc0cf054722840caf5