Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
a8ee0f6acc9c035fe18a6447b9007dc0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a8ee0f6acc9c035fe18a6447b9007dc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a8ee0f6acc9c035fe18a6447b9007dc0N.exe
-
Size
37KB
-
MD5
a8ee0f6acc9c035fe18a6447b9007dc0
-
SHA1
7037037a9109904b47c06842559c9564ce047b68
-
SHA256
5b02654f2f4d42076312e8f6d5303ff5be3f4de6d95f53ce8c5e007773c5819f
-
SHA512
d367242739e0aed21d560b2140c40507dca617f0369e283fc2faa72102d1ea801fe355dba3ed329a0482a250d1e367bec45dc115f232f30d01f77445263b3459
-
SSDEEP
384:MApc8m4e0LvQak4JI341CNabnkIU0Sq0yD4h:MApQr0LvdFJI34nTkIU0Eych
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 1848 a8ee0f6acc9c035fe18a6447b9007dc0N.exe 1848 a8ee0f6acc9c035fe18a6447b9007dc0N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe a8ee0f6acc9c035fe18a6447b9007dc0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8ee0f6acc9c035fe18a6447b9007dc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2860 1848 a8ee0f6acc9c035fe18a6447b9007dc0N.exe 30 PID 1848 wrote to memory of 2860 1848 a8ee0f6acc9c035fe18a6447b9007dc0N.exe 30 PID 1848 wrote to memory of 2860 1848 a8ee0f6acc9c035fe18a6447b9007dc0N.exe 30 PID 1848 wrote to memory of 2860 1848 a8ee0f6acc9c035fe18a6447b9007dc0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8ee0f6acc9c035fe18a6447b9007dc0N.exe"C:\Users\Admin\AppData\Local\Temp\a8ee0f6acc9c035fe18a6447b9007dc0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5b635fd03ed829b2020fb8132bee8a48a
SHA1a27b926c3c832d2d2fc44d98a24399d145840dd7
SHA256ad636bedadfc70c76120985c7decd9f027723aeb0edd02cfddd735f1206b0bb2
SHA512d220b2426b603e73f5d46c324900bb155bfad2ec992f99ca124817aed36a41aa1503d133e7887c4f3490e78cd43b84719a979c89de488f79a6252dabd5541e19