Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe
Resource
win10v2004-20240802-en
General
-
Target
c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe
-
Size
14KB
-
MD5
916d4798cea5abdb517c3b2626c2548b
-
SHA1
379d8f375af374b6802fb97f4b89f6cc25724acb
-
SHA256
c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a
-
SHA512
624206f4cd40405827c4baff881132bd9f3b99849916b15987a447d970adf154c1fc8f563753acbd1543d7bb7f0033bb1067f0f0ba6308d66dd7b77faa39dc5e
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhR0J0N:hDXWipuE+K3/SSHgx4CN
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2772 DEM898A.exe 2988 DEMDF28.exe 2836 DEM34A7.exe 2976 DEM8AD2.exe 1848 DEMDFE4.exe 1652 DEM3553.exe -
Loads dropped DLL 6 IoCs
pid Process 2504 c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe 2772 DEM898A.exe 2988 DEMDF28.exe 2836 DEM34A7.exe 2976 DEM8AD2.exe 1848 DEMDFE4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM898A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMDF28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM34A7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM8AD2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMDFE4.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2772 2504 c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe 32 PID 2504 wrote to memory of 2772 2504 c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe 32 PID 2504 wrote to memory of 2772 2504 c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe 32 PID 2504 wrote to memory of 2772 2504 c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe 32 PID 2772 wrote to memory of 2988 2772 DEM898A.exe 34 PID 2772 wrote to memory of 2988 2772 DEM898A.exe 34 PID 2772 wrote to memory of 2988 2772 DEM898A.exe 34 PID 2772 wrote to memory of 2988 2772 DEM898A.exe 34 PID 2988 wrote to memory of 2836 2988 DEMDF28.exe 36 PID 2988 wrote to memory of 2836 2988 DEMDF28.exe 36 PID 2988 wrote to memory of 2836 2988 DEMDF28.exe 36 PID 2988 wrote to memory of 2836 2988 DEMDF28.exe 36 PID 2836 wrote to memory of 2976 2836 DEM34A7.exe 38 PID 2836 wrote to memory of 2976 2836 DEM34A7.exe 38 PID 2836 wrote to memory of 2976 2836 DEM34A7.exe 38 PID 2836 wrote to memory of 2976 2836 DEM34A7.exe 38 PID 2976 wrote to memory of 1848 2976 DEM8AD2.exe 40 PID 2976 wrote to memory of 1848 2976 DEM8AD2.exe 40 PID 2976 wrote to memory of 1848 2976 DEM8AD2.exe 40 PID 2976 wrote to memory of 1848 2976 DEM8AD2.exe 40 PID 1848 wrote to memory of 1652 1848 DEMDFE4.exe 42 PID 1848 wrote to memory of 1652 1848 DEMDFE4.exe 42 PID 1848 wrote to memory of 1652 1848 DEMDFE4.exe 42 PID 1848 wrote to memory of 1652 1848 DEMDFE4.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe"C:\Users\Admin\AppData\Local\Temp\c0356144c38cb5652b21228d74d92cd4ea0ab13dd5cea2a47d4b0d9af273567a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\DEM898A.exe"C:\Users\Admin\AppData\Local\Temp\DEM898A.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\DEMDF28.exe"C:\Users\Admin\AppData\Local\Temp\DEMDF28.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\DEM34A7.exe"C:\Users\Admin\AppData\Local\Temp\DEM34A7.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\DEM8AD2.exe"C:\Users\Admin\AppData\Local\Temp\DEM8AD2.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\DEMDFE4.exe"C:\Users\Admin\AppData\Local\Temp\DEMDFE4.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\DEM3553.exe"C:\Users\Admin\AppData\Local\Temp\DEM3553.exe"7⤵
- Executes dropped EXE
PID:1652
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD55a92f693aed15f1d5e00298edb5a0b59
SHA1d16e186d5d82c579b18535456642dc1bcfe27d48
SHA2560a3e286d6f0464094d0af232cbd4dfa8609d8c9e7e3c05b83008ec4d6171756c
SHA512415a676ac7ccf75071ae116b9ae97bf660eba33a41b958d51267e6e3c4f8143dbb5af75b04ad8130bdb5cd52038c1480ad157bbdcfafeb331f2c08b2edfcf264
-
Filesize
14KB
MD516b289fd72f43eb9fad280c297257eee
SHA1cd2f910f26001563faf55609eb61ccd49c5b6a5b
SHA256911a2a900efcc89c497da55cb4829e28d8de194ed8f6f121be8d23d85755970e
SHA512f104e3a693c43211bc799c9eb286cdae89cd56d5ddd5d683ae9f9241744bd5e26944b04f1b761c087b94ad60cde08be728435ae4fa0c75d4be650ae5c1ebd852
-
Filesize
14KB
MD59d6d372e09ab2c1d336d812b12fe7d2b
SHA182688211116fb95b0754a1bcd478fb14bef0a28b
SHA2560bff0ea560d0401c7b1b75bba38e7ea57636f833814cc2d460d9abd2e0447759
SHA512f1540e67fae1cf13fb5b94ae1a1adff1462a3baa420929f78b42316a649fbd685c17e8af5f3414a0b7c6186e44eee2ebb3d9e6a438e5ceef6ffcc1dc0c53f9ff
-
Filesize
14KB
MD597c33a2f13ad15b70cacf35ac8328428
SHA1563839bb05388bdb5c09856c0bb2d5217198a84c
SHA256ccc14c0dfdb142aacecaf1ff460aad922211ecdf0cc04d7d373e574410413694
SHA51234b759a081285fb68071a53482de0fa9fd744304376ae6dbaf9604bacf3a723c8f1dc321fe0501d0afa4fb2c1d1bd754c59cc38b8a34d147c9ccfbd4754d48bb
-
Filesize
14KB
MD55309abaa7ec33a42121a1ba62be58c4d
SHA198a1f086eeefcab66cf61428ba54a72f90175143
SHA256ac4b796ac7abded5258babc2989f2b7933f129635aea79ae4dfc713d788c25e1
SHA51284c456753fa829c6edc461ef40473dac8909cde30e835b436b0ee6d0f1fd5e699ef07e4c40ea84d605895ae531051e9c73012589be4ceec15b1e69f9f7f2c504
-
Filesize
14KB
MD5a9082509f99fad939e006b7479670aed
SHA180e5c4334f4991ffc924e740f0f94f6fbfe222a4
SHA2564976483ded3de7a05ee1009e735be0cecc8305736ae1d26b4ca2d44013e4d944
SHA5129cb6bd9d5d807f2bd6674759d81c683a8572d9cfdd33fe5d5bf557aef2ed9c6f5efe0f374405f86ebaf247bd06492adf0dda21af1ac3775582efb6d84c836885