Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
11b8b251393813a103ac30465b296a20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11b8b251393813a103ac30465b296a20N.exe
Resource
win10v2004-20240802-en
General
-
Target
11b8b251393813a103ac30465b296a20N.exe
-
Size
1.2MB
-
MD5
11b8b251393813a103ac30465b296a20
-
SHA1
737126a04a75bf28f6fad9de70974e87c2b4a1bf
-
SHA256
e02d5badfc8d771117b546ea87f509e2d8268b59ba0c8df3167f70eefe85fa38
-
SHA512
c0748b6b40a70cfec292be8af822a1e523165a0022d0de3c776abf727ff90672b5f96f6cdfabb0fd75ac9bd0b77f941818e911175182769ea42a53649f6981ec
-
SSDEEP
12288:RrNZUyzQ+BPVi33u2DjlDa/ZSEniF+G4l:lNFzQtxa/ZSEniF+9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 11b8b251393813a103ac30465b296a20N.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 11b8b251393813a103ac30465b296a20N.exe -
Loads dropped DLL 4 IoCs
pid Process 2688 11b8b251393813a103ac30465b296a20N.exe 2300 WerFault.exe 2300 WerFault.exe 2300 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2300 2860 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11b8b251393813a103ac30465b296a20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11b8b251393813a103ac30465b296a20N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2688 11b8b251393813a103ac30465b296a20N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2860 11b8b251393813a103ac30465b296a20N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2860 2688 11b8b251393813a103ac30465b296a20N.exe 32 PID 2688 wrote to memory of 2860 2688 11b8b251393813a103ac30465b296a20N.exe 32 PID 2688 wrote to memory of 2860 2688 11b8b251393813a103ac30465b296a20N.exe 32 PID 2688 wrote to memory of 2860 2688 11b8b251393813a103ac30465b296a20N.exe 32 PID 2860 wrote to memory of 2300 2860 11b8b251393813a103ac30465b296a20N.exe 33 PID 2860 wrote to memory of 2300 2860 11b8b251393813a103ac30465b296a20N.exe 33 PID 2860 wrote to memory of 2300 2860 11b8b251393813a103ac30465b296a20N.exe 33 PID 2860 wrote to memory of 2300 2860 11b8b251393813a103ac30465b296a20N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\11b8b251393813a103ac30465b296a20N.exe"C:\Users\Admin\AppData\Local\Temp\11b8b251393813a103ac30465b296a20N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\11b8b251393813a103ac30465b296a20N.exeC:\Users\Admin\AppData\Local\Temp\11b8b251393813a103ac30465b296a20N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e5289867925df768fdd0686bc13e1816
SHA1ed8e51eb766c55972521c22f3f237109fffa3ea0
SHA256c9c404136c6d731d7b14fcf507a36f135409ea8e2239a4c5add535bb65830cdd
SHA512df9f22066239089f81eb65a1fa2224ee420c32ba93b6025da460804462eeea9cdf5c58209498e8e504456509a46feb9b3fa9f2696bc25d0c76a57be1a403ae7d