Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
ecbb1f01168bbe00fcee8ef1cf986e00N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecbb1f01168bbe00fcee8ef1cf986e00N.exe
Resource
win10v2004-20240802-en
General
-
Target
ecbb1f01168bbe00fcee8ef1cf986e00N.exe
-
Size
23KB
-
MD5
ecbb1f01168bbe00fcee8ef1cf986e00
-
SHA1
a5057d7499849058a2861371d25ef4e7f89ca7df
-
SHA256
258a6228c1c820c9c6994605192bef5644f7b93a6e4371e6d7af731b5d53a026
-
SHA512
d371e339344e42337f270e5f57e25208883c72a05cbc3da4dd9999f4e447e76584feebc050d3046e12f9657d571e3ef1308fa0e62a99d13be1b08657e615c7b4
-
SSDEEP
384:bAmt53ZsCQ4P+GhplI+22rL7bJ0qLPXa0w1X+jv9LLaPaoE/do:bJHsCJ+Ghg+22rL7bJ0qLPXa0NjF5JW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2688 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2712 ecbb1f01168bbe00fcee8ef1cf986e00N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecbb1f01168bbe00fcee8ef1cf986e00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2688 2712 ecbb1f01168bbe00fcee8ef1cf986e00N.exe 30 PID 2712 wrote to memory of 2688 2712 ecbb1f01168bbe00fcee8ef1cf986e00N.exe 30 PID 2712 wrote to memory of 2688 2712 ecbb1f01168bbe00fcee8ef1cf986e00N.exe 30 PID 2712 wrote to memory of 2688 2712 ecbb1f01168bbe00fcee8ef1cf986e00N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecbb1f01168bbe00fcee8ef1cf986e00N.exe"C:\Users\Admin\AppData\Local\Temp\ecbb1f01168bbe00fcee8ef1cf986e00N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD518bc42885415f9d4b7d543082e0a69b9
SHA1035b2fb4c7885ae39872c41fa3dd32d20cfb1d39
SHA256e0d605453ebbe624d03209fb2b508e9a85b12733f4bf5e7cdebdddae33eed5d5
SHA512014db370d272a20f8f076d047692627ba57c2bf4e5bd2c207f1f42616182c0fabb16f6d131d94b1d72b0c71a6aa7844cc8fc67ff1ee89b1fad36672bc596a0c1