Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
Resource
win10v2004-20240802-en
General
-
Target
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
-
Size
1.2MB
-
MD5
562cb5dcba0e691bf01ab2c020c0837e
-
SHA1
3ca5eb915edcce7da20a7b6046055cb11333647e
-
SHA256
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52
-
SHA512
130e921e7bd869c6367a4fe664a5fe9df6432ff5ca3519d9fe4d378b52f4675b89ec9312a02ea8246868326d9c0c65703a45e289478afc7f26ce1ce6310077a9
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8awSX4F1d5Y/j20uMjwr4b:oTvC/MTQYxsWR7aw6yYpw4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2384 set thread context of 2360 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 2360 set thread context of 1196 2360 svchost.exe 21 PID 2360 set thread context of 2852 2360 svchost.exe 32 PID 2852 set thread context of 1196 2852 msiexec.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2360 svchost.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe 2852 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 2360 svchost.exe 1196 Explorer.EXE 1196 Explorer.EXE 2852 msiexec.exe 2852 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2360 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 2384 wrote to memory of 2360 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 2384 wrote to memory of 2360 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 2384 wrote to memory of 2360 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 2384 wrote to memory of 2360 2384 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 1196 wrote to memory of 2852 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2852 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2852 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2852 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2852 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2852 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2852 1196 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2360
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5a1fb5c2c967aa8558c7d23183f7afd9c
SHA146a77e92eade977bbf0ec71afb2bc2a413e2af3b
SHA256acc62b73f9afc1ffa76dfd1823bb3b6e2257ef8058cf8e7daf733fd584ed9ef2
SHA51204e2a1888d8751774ecaf2d0a55bc92acac79e0212771355d8da9c7d6644a72a574d1686cc065900d04c08edc22b29560fcfac7d2f9b5698544b65b3424b03ec