Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
770bd2b52da41659366ab5e9511b48e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
770bd2b52da41659366ab5e9511b48e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
770bd2b52da41659366ab5e9511b48e0N.exe
-
Size
208KB
-
MD5
770bd2b52da41659366ab5e9511b48e0
-
SHA1
b137e24b2c60600df6646d62beb5a630e47877fe
-
SHA256
d41fa3f65ecbf634812ffe9cb29bf546ff50d1456b0e89380d4f575a30329b97
-
SHA512
d09a07343b42c06523db70524740e0ae32847143e01229564893c43a9e731ce9006e3421873031e882832c625933fba86da670b8a9b0b86a70c1866e2620122e
-
SSDEEP
3072:tFqNLS84DiRZ594WGpPqgCjP1u4eJNLGJLWnulSGi4NLthEjQT6:7KLyDYd4WGxqph01GJ8m+QEj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2968 UJS.exe -
Loads dropped DLL 2 IoCs
pid Process 2984 cmd.exe 2984 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\system\UJS.exe 770bd2b52da41659366ab5e9511b48e0N.exe File opened for modification C:\windows\system\UJS.exe 770bd2b52da41659366ab5e9511b48e0N.exe File created C:\windows\system\UJS.exe.bat 770bd2b52da41659366ab5e9511b48e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UJS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 770bd2b52da41659366ab5e9511b48e0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2180 770bd2b52da41659366ab5e9511b48e0N.exe 2968 UJS.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2180 770bd2b52da41659366ab5e9511b48e0N.exe 2180 770bd2b52da41659366ab5e9511b48e0N.exe 2968 UJS.exe 2968 UJS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2984 2180 770bd2b52da41659366ab5e9511b48e0N.exe 30 PID 2180 wrote to memory of 2984 2180 770bd2b52da41659366ab5e9511b48e0N.exe 30 PID 2180 wrote to memory of 2984 2180 770bd2b52da41659366ab5e9511b48e0N.exe 30 PID 2180 wrote to memory of 2984 2180 770bd2b52da41659366ab5e9511b48e0N.exe 30 PID 2984 wrote to memory of 2968 2984 cmd.exe 32 PID 2984 wrote to memory of 2968 2984 cmd.exe 32 PID 2984 wrote to memory of 2968 2984 cmd.exe 32 PID 2984 wrote to memory of 2968 2984 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\770bd2b52da41659366ab5e9511b48e0N.exe"C:\Users\Admin\AppData\Local\Temp\770bd2b52da41659366ab5e9511b48e0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system\UJS.exe.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\windows\system\UJS.exeC:\windows\system\UJS.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD5a8ff3a704cb3d8fecc2245fca991b25b
SHA1c9cf64dc55406d5308b776464de7c797481666f3
SHA256f5c772e9d0852b71f1d894633676f6bda6b8130c5d7c3c9e6865b993dba7df28
SHA51282584e3913e28e0f0562b4763081e4192f95915ba38760724fa1cb197c538c247ba60a755d7a2fbed100daa4f2d9b423d3bb38196a0404da0bdf0ee7540acf84
-
Filesize
208KB
MD5665c95df367f098397abc7a766259d79
SHA1ac5c727aba89ab401a60b9fe85808fad339e685d
SHA25686d0894b8720c12a02cfff202a80fe71c7c8dd06930efcb283c3d5be900395e5
SHA512fd6f18b3555d2a91500b0a4b0d3d85bf889f5bbf42e320d500411184bfe6d1f303ddaa8e9ba1d814594dbb8f95b4fda20491d1e6da1f909c12a600513f40cbf1