Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    84s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 16:27

General

  • Target

    79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe

  • Size

    2.4MB

  • MD5

    e50ca1b8e0703ed90cef988084d8b0f5

  • SHA1

    9e645af30750e97d24867b0cda97dc9440fe232f

  • SHA256

    79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c

  • SHA512

    c91fee1475024ebb9638f99fade160cc2841a6d1f9586e0f4609040f22955920481671cc0a939b6089325dedd47929328a98074db29ff504b39241ed89cfe608

  • SSDEEP

    49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJr:J+Qf7cqA0bt2rK09cohiLUbQJJr

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe
    "C:\Users\Admin\AppData\Local\Temp\79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic cpu get name/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:7252
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic cpu get name/value
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:7280
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:7360
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic Path Win32_DisplayConfiguration get DeviceName/value
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:7388
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:7464
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic COMPUTERSYSTEM get TotalPhysicalMemory/value
        3⤵
        • System Location Discovery: System Language Discovery
        PID:7488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2116-0-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB

  • memory/2116-1-0x00000000768C0000-0x0000000076907000-memory.dmp

    Filesize

    284KB

  • memory/2116-504-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-503-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-506-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-508-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-510-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-514-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-512-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-516-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-518-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-520-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-528-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-552-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-564-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-562-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-560-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-558-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-556-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-554-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-550-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-548-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-546-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-544-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-542-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-540-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-538-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-536-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-534-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-532-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-530-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-526-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-524-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-522-0x00000000026C0000-0x00000000027D1000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-7791-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB