Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 08:24

General

  • Target

    014776957e0963024c62982d9edf4eb0N.exe

  • Size

    320KB

  • MD5

    014776957e0963024c62982d9edf4eb0

  • SHA1

    d4f5a81109b26f96d72f160ddb557cab9a7f84a8

  • SHA256

    fc36cd269e375991220e5e06a4d20a60e5240fbd543dace5dedd823d8ff0356a

  • SHA512

    41dbf9a3a64b7ed00f0c038ccb8d709ff4e39c84301f4b38fef8b76eb3b6f27894de281ba483d528c4b9c3ed26e1bbd3a8e0672fe11fdc44ff1906d6d685db61

  • SSDEEP

    6144:VY7e9uuZExOri72+Y7jCnnq9vmqYWr6xVGym1Bk53BDu0W7cyqCxSngmMBqfycuq:VWu2x0i72+Y70Emw6xVPmA53p80npM4/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe
      C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe

    Filesize

    320KB

    MD5

    5dfca30570c45995f3c0a4603c97bb95

    SHA1

    f0c1212e8f7144ea20e698cab145225a46a60c43

    SHA256

    a6bc8b532c0f47ee51d85c693a9fcf9144536935c7b31f34e75b16f3e6c56b96

    SHA512

    82d60e3720ca0cff94d949ffce4aad8b2c12cc8d06997d3caa53d446958dc61c53e4890ee2cc0985c1a1995dde71b59ce3664618ca46dccf8e72eaa0d2c6ed71

  • memory/2232-0-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2232-8-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2532-10-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2532-16-0x00000000001B0000-0x00000000001EC000-memory.dmp

    Filesize

    240KB

  • memory/2532-11-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2532-17-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB