Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
869c9b5dfb6aaa3188ced5e4481aedd0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
869c9b5dfb6aaa3188ced5e4481aedd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
869c9b5dfb6aaa3188ced5e4481aedd0N.exe
-
Size
832KB
-
MD5
869c9b5dfb6aaa3188ced5e4481aedd0
-
SHA1
b6ff0ce27fa0fca90310b37f5be026ffd48b76f7
-
SHA256
03eb8f344a9cfb16bafcf617b5babb96fc228acaa668792a0c0f8b650921abf6
-
SHA512
f1ca8e7c16f873cb99bf0e8401480771d1a19d72a3c06d3e54390605d92ef65c06c0d2f0cfc6d65c6ba62c4c3b98429bf5a417abbaaaa27babd24a316219a812
-
SSDEEP
12288:NYIW0p98Oh8P7h8Nw2KJvsQPMe8nCX62qVWTI5yl48pArv8o4HBTVGZJARr:ZW298E8uinvhEveqsT9r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2168 80F3.tmp -
Loads dropped DLL 1 IoCs
pid Process 2280 869c9b5dfb6aaa3188ced5e4481aedd0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80F3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 869c9b5dfb6aaa3188ced5e4481aedd0N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2168 80F3.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2848 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 80F3.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2848 WINWORD.EXE 2848 WINWORD.EXE 2848 WINWORD.EXE 2848 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2168 2280 869c9b5dfb6aaa3188ced5e4481aedd0N.exe 30 PID 2280 wrote to memory of 2168 2280 869c9b5dfb6aaa3188ced5e4481aedd0N.exe 30 PID 2280 wrote to memory of 2168 2280 869c9b5dfb6aaa3188ced5e4481aedd0N.exe 30 PID 2280 wrote to memory of 2168 2280 869c9b5dfb6aaa3188ced5e4481aedd0N.exe 30 PID 2168 wrote to memory of 2848 2168 80F3.tmp 31 PID 2168 wrote to memory of 2848 2168 80F3.tmp 31 PID 2168 wrote to memory of 2848 2168 80F3.tmp 31 PID 2168 wrote to memory of 2848 2168 80F3.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\869c9b5dfb6aaa3188ced5e4481aedd0N.exe"C:\Users\Admin\AppData\Local\Temp\869c9b5dfb6aaa3188ced5e4481aedd0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\80F3.tmp"C:\Users\Admin\AppData\Local\Temp\80F3.tmp" --pingC:\Users\Admin\AppData\Local\Temp\869c9b5dfb6aaa3188ced5e4481aedd0N.exe 2AA1D28D73CB3BA6A6AC5B9167040481C3684F4E6B329D13FEA65F585C86F0971FA7E94FF82AFEBE1F59193AA8F3B5C5C5DE3E599DC17360BD4B4968B3FA69C12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\869c9b5dfb6aaa3188ced5e4481aedd0N.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
832KB
MD5ad093fb9a4af9439c221d1e536d03804
SHA1538ec5fb6ba6de09e5dcf6c51f29dfa57f443da5
SHA256945de48a923da9d36f1eb24feab346a5be9d84b089dfeb21aaf15ac2b04f0275
SHA512f720d3151e28cf44ab75d061ca009385007b446ac5da4e1a434c4b74c3436a8fcf9932b955b028b52a9c2e8eac99e527891e6e894dfbcd2de593a3f5d89a119f