Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    69s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 09:30

General

  • Target

    734f34968e0c3637965c244818082490N.exe

  • Size

    44KB

  • MD5

    734f34968e0c3637965c244818082490

  • SHA1

    d7cae5123c3aa97617c0c6868768f7e9e297cf3a

  • SHA256

    81306e3941232175929fe779a66cb47ebacf0bf85b569b747af162f1eac173ca

  • SHA512

    35c574030688ec4ab77cb547c39bd68ecd9bfc9d5f9faa3f2b65bedcc00c9458f89768fd7e8434952db3c22b815c4328a907a113c9f94ce4b364bdb3c134a748

  • SSDEEP

    768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1Wn2bK:MAaDJlMsh7pWezaK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\734f34968e0c3637965c244818082490N.exe
    "C:\Users\Admin\AppData\Local\Temp\734f34968e0c3637965c244818082490N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\sal.exe

    Filesize

    44KB

    MD5

    98ec4951b0587fcad051a709a7117c2f

    SHA1

    84e7549a7c701f14574695b608a466df96547273

    SHA256

    46b2e55504aa2bff02c7c4f4d7a7edda42f75137baebb1f603e54a6005c75cdd

    SHA512

    ff31ab0b066558987799906e3c3cba7f087b2dbb580c0e80a7fd7f9e4d9e9c0123e592e7bbbcb6885e8b79697257354d8ea3359a0a09b5e93540a160312588e0

  • memory/2648-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2648-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2660-12-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB