Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
014776957e0963024c62982d9edf4eb0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
014776957e0963024c62982d9edf4eb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
014776957e0963024c62982d9edf4eb0N.exe
-
Size
320KB
-
MD5
014776957e0963024c62982d9edf4eb0
-
SHA1
d4f5a81109b26f96d72f160ddb557cab9a7f84a8
-
SHA256
fc36cd269e375991220e5e06a4d20a60e5240fbd543dace5dedd823d8ff0356a
-
SHA512
41dbf9a3a64b7ed00f0c038ccb8d709ff4e39c84301f4b38fef8b76eb3b6f27894de281ba483d528c4b9c3ed26e1bbd3a8e0672fe11fdc44ff1906d6d685db61
-
SSDEEP
6144:VY7e9uuZExOri72+Y7jCnnq9vmqYWr6xVGym1Bk53BDu0W7cyqCxSngmMBqfycuq:VWu2x0i72+Y70Emw6xVPmA53p80npM4/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2532 014776957e0963024c62982d9edf4eb0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2532 014776957e0963024c62982d9edf4eb0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 014776957e0963024c62982d9edf4eb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 014776957e0963024c62982d9edf4eb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 014776957e0963024c62982d9edf4eb0N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2532 014776957e0963024c62982d9edf4eb0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2232 014776957e0963024c62982d9edf4eb0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2532 014776957e0963024c62982d9edf4eb0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2532 2232 014776957e0963024c62982d9edf4eb0N.exe 30 PID 2232 wrote to memory of 2532 2232 014776957e0963024c62982d9edf4eb0N.exe 30 PID 2232 wrote to memory of 2532 2232 014776957e0963024c62982d9edf4eb0N.exe 30 PID 2232 wrote to memory of 2532 2232 014776957e0963024c62982d9edf4eb0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe"C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exeC:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD55dfca30570c45995f3c0a4603c97bb95
SHA1f0c1212e8f7144ea20e698cab145225a46a60c43
SHA256a6bc8b532c0f47ee51d85c693a9fcf9144536935c7b31f34e75b16f3e6c56b96
SHA51282d60e3720ca0cff94d949ffce4aad8b2c12cc8d06997d3caa53d446958dc61c53e4890ee2cc0985c1a1995dde71b59ce3664618ca46dccf8e72eaa0d2c6ed71