Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
734f34968e0c3637965c244818082490N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
734f34968e0c3637965c244818082490N.exe
Resource
win10v2004-20240802-en
General
-
Target
734f34968e0c3637965c244818082490N.exe
-
Size
44KB
-
MD5
734f34968e0c3637965c244818082490
-
SHA1
d7cae5123c3aa97617c0c6868768f7e9e297cf3a
-
SHA256
81306e3941232175929fe779a66cb47ebacf0bf85b569b747af162f1eac173ca
-
SHA512
35c574030688ec4ab77cb547c39bd68ecd9bfc9d5f9faa3f2b65bedcc00c9458f89768fd7e8434952db3c22b815c4328a907a113c9f94ce4b364bdb3c134a748
-
SSDEEP
768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1Wn2bK:MAaDJlMsh7pWezaK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2660 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 2648 734f34968e0c3637965c244818082490N.exe 2648 734f34968e0c3637965c244818082490N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 734f34968e0c3637965c244818082490N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 734f34968e0c3637965c244818082490N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2660 2648 734f34968e0c3637965c244818082490N.exe 30 PID 2648 wrote to memory of 2660 2648 734f34968e0c3637965c244818082490N.exe 30 PID 2648 wrote to memory of 2660 2648 734f34968e0c3637965c244818082490N.exe 30 PID 2648 wrote to memory of 2660 2648 734f34968e0c3637965c244818082490N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\734f34968e0c3637965c244818082490N.exe"C:\Users\Admin\AppData\Local\Temp\734f34968e0c3637965c244818082490N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD598ec4951b0587fcad051a709a7117c2f
SHA184e7549a7c701f14574695b608a466df96547273
SHA25646b2e55504aa2bff02c7c4f4d7a7edda42f75137baebb1f603e54a6005c75cdd
SHA512ff31ab0b066558987799906e3c3cba7f087b2dbb580c0e80a7fd7f9e4d9e9c0123e592e7bbbcb6885e8b79697257354d8ea3359a0a09b5e93540a160312588e0