Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 21:30
Behavioral task
behavioral1
Sample
8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe
Resource
win7-20240903-en
General
-
Target
8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe
-
Size
1.5MB
-
MD5
bbf324cf9353b82eb282bd2b0625e34c
-
SHA1
ef394b771769bd7295883401dcd9b164e532620e
-
SHA256
8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf
-
SHA512
92324726689989f1504dcbe6d6cf0518dba150737640807c0e7129c1f01b8b5342e204124adaea582cb0aef3ba0793642b1f99229dc808d3b193930b72d53801
-
SSDEEP
24576:SDEDdEI1e2Xdfft20f60XnWUoiH+bP+vPFOWP8bUszsqFLH0Wv+2Iap:yEDeI1euXu0X5VNXkbU1q50Wlp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
resource yara_rule behavioral1/memory/2680-0-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-8-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-10-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-15-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-18-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-20-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-21-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-22-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-25-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-26-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-27-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-28-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-29-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-30-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-31-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-32-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-33-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-34-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-35-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-36-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral1/memory/2680-37-0x0000000000400000-0x0000000000A9B200-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 2680 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe"C:\Users\Admin\AppData\Local\Temp\8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5efb75d2b5d728069ea4eeb06e5254e12
SHA1299f0f5e3ceae11c580f6f66c3c3657d3dafb00f
SHA256f1056edb03ea2f9eb3157980a9a3065c2d359246e1768272169df3f6f642051a
SHA5123975094868b357522d94f2795443c7c21ee1a8a1c7c66d89db75698bfb5d9f5a370a7c5692f6e3aca186bd23fe60db3fb32059c1e5bb2eaeba39f9a957f1ab82
-
Filesize
724KB
MD5a96fbd5e66b31f3d816ad80f623e9bd9
SHA14eda42260bd3eb930cd4eafd7d15c6af367bcf18
SHA2562e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3
SHA51243921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e