Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
84a9a63c183f9134714fedcb7fb5f5e0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84a9a63c183f9134714fedcb7fb5f5e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
84a9a63c183f9134714fedcb7fb5f5e0N.exe
-
Size
654KB
-
MD5
84a9a63c183f9134714fedcb7fb5f5e0
-
SHA1
9039447af0b6cec72737aba31211deeb6f4543c7
-
SHA256
317f18f14e26eec4b17fd2f0b961aecc912c2172955ef75c7f30ecc1a22caef3
-
SHA512
b28ba798418dc2eeb70ad6f86d51776c33422f97d6dd336ecf2fba5e989d6d431209b226e24ee0d79f0eddc1feda64f1d939878027a21af475a5ef38e819cbb9
-
SSDEEP
12288:oYIW0p98Oh8P7h8GGsOvXSVqby69pezUapFc32TPu7he9gyCWTHb:EW298E8uGiXCqbZ2zRFc32TPu7he9gy5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 ECDE.tmp -
Loads dropped DLL 1 IoCs
pid Process 2848 84a9a63c183f9134714fedcb7fb5f5e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84a9a63c183f9134714fedcb7fb5f5e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ECDE.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2084 ECDE.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2776 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 ECDE.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2776 WINWORD.EXE 2776 WINWORD.EXE 2776 WINWORD.EXE 2776 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2084 2848 84a9a63c183f9134714fedcb7fb5f5e0N.exe 31 PID 2848 wrote to memory of 2084 2848 84a9a63c183f9134714fedcb7fb5f5e0N.exe 31 PID 2848 wrote to memory of 2084 2848 84a9a63c183f9134714fedcb7fb5f5e0N.exe 31 PID 2848 wrote to memory of 2084 2848 84a9a63c183f9134714fedcb7fb5f5e0N.exe 31 PID 2084 wrote to memory of 2776 2084 ECDE.tmp 32 PID 2084 wrote to memory of 2776 2084 ECDE.tmp 32 PID 2084 wrote to memory of 2776 2084 ECDE.tmp 32 PID 2084 wrote to memory of 2776 2084 ECDE.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\84a9a63c183f9134714fedcb7fb5f5e0N.exe"C:\Users\Admin\AppData\Local\Temp\84a9a63c183f9134714fedcb7fb5f5e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\ECDE.tmp"C:\Users\Admin\AppData\Local\Temp\ECDE.tmp" --pingC:\Users\Admin\AppData\Local\Temp\84a9a63c183f9134714fedcb7fb5f5e0N.exe 481B8B9EEEAB7BD2103B062EEA30E8092B22D0FE760E133FAD475561F5C2C760D4D2EC2C354D7D3FD667DF6F38B6E7CD1C1522CE29BA6AD43A7F2A4FE5D421942⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\84a9a63c183f9134714fedcb7fb5f5e0N.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
654KB
MD5461f8d8b9a874f78523409d802257109
SHA13f9387b3733fb53fd50ae76afba966dd2a1d2eca
SHA256a331e192d30f0eba1dbcc501d2662ab0586d38c1bf6398ae5dcc992b24b75f9f
SHA512a9dc44705d0a0e65d9cad4005556bc19b5ad142c2ea7a5a96716f492ca6d1242fdeff7712a398132c6c3da3723801e1ac01313e57d2f3a07489581eed1950338