Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
1e53b7ee69436ae0d4e4811f36c2c540N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e53b7ee69436ae0d4e4811f36c2c540N.exe
Resource
win10v2004-20240802-en
General
-
Target
1e53b7ee69436ae0d4e4811f36c2c540N.exe
-
Size
97KB
-
MD5
1e53b7ee69436ae0d4e4811f36c2c540
-
SHA1
24887e25edcb4703cd499b3a6f3993a005369208
-
SHA256
3f89e36ce77be3151eae0bfd137f7797a591950cf270165b5d5efcdacf4b763f
-
SHA512
81961daa2f54f8863c26b5ea7c5be38945c28fab0cc18c9d03682b6bcb3d419784460f72cae275fc21074429b83ce60e2ef5c5d1cc55555fd9759fb83954fe81
-
SSDEEP
1536:0MybiksPWaKVqY3k8qD3uFbzzO8C4Y9c+sJUZy/K/s9b84C6:ty+3WaKVGD3uFHC8C4jWiv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1656 olacweegim.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 1e53b7ee69436ae0d4e4811f36c2c540N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e53b7ee69436ae0d4e4811f36c2c540N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language olacweegim.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1656 2368 1e53b7ee69436ae0d4e4811f36c2c540N.exe 30 PID 2368 wrote to memory of 1656 2368 1e53b7ee69436ae0d4e4811f36c2c540N.exe 30 PID 2368 wrote to memory of 1656 2368 1e53b7ee69436ae0d4e4811f36c2c540N.exe 30 PID 2368 wrote to memory of 1656 2368 1e53b7ee69436ae0d4e4811f36c2c540N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e53b7ee69436ae0d4e4811f36c2c540N.exe"C:\Users\Admin\AppData\Local\Temp\1e53b7ee69436ae0d4e4811f36c2c540N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\olacweegim.exeC:\Users\Admin\AppData\Local\Temp\olacweegim.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5d74412fea41b06383ded19499d62e355
SHA17e99bc22244abad108b2ad82e90dc78cc9156d41
SHA2563eb6272560ed38cb198f612241205d22a30abb27f8ed34eedd06566068105759
SHA5120d91ff5f9435c4ab451835393526a863c42347cae0b2ed3c8f3d3e7679b07067b2d8e10b511af62380e1fa9aad4b5eb8a17a3eb7691233a8de8e7d6f6a2f3edd