Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
339578335d562261768d729fa085b4a0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
339578335d562261768d729fa085b4a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
339578335d562261768d729fa085b4a0N.exe
-
Size
5.4MB
-
MD5
339578335d562261768d729fa085b4a0
-
SHA1
6aa01e749e3571fc57804b03a97bae2942722d32
-
SHA256
72b888bc6a6dceacf96659ff0352c80d1ad377460ea27ef8509d3c875926365d
-
SHA512
d0e1147a97226227f95c39cbeb998831e94b7e565b4d087f7c07b391ee475b838708c0125c9d033f60fcdfa46094a7bf12f45f41901109b804e89609f0f281b8
-
SSDEEP
98304:emhd1UryeoRZ8Ilk/CusWuTDPV7wQqZUha5jtSyZIUh:elIRmH6P2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1432 9109.tmp -
Executes dropped EXE 1 IoCs
pid Process 1432 9109.tmp -
Loads dropped DLL 2 IoCs
pid Process 1740 339578335d562261768d729fa085b4a0N.exe 1740 339578335d562261768d729fa085b4a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 339578335d562261768d729fa085b4a0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1432 1740 339578335d562261768d729fa085b4a0N.exe 30 PID 1740 wrote to memory of 1432 1740 339578335d562261768d729fa085b4a0N.exe 30 PID 1740 wrote to memory of 1432 1740 339578335d562261768d729fa085b4a0N.exe 30 PID 1740 wrote to memory of 1432 1740 339578335d562261768d729fa085b4a0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\339578335d562261768d729fa085b4a0N.exe"C:\Users\Admin\AppData\Local\Temp\339578335d562261768d729fa085b4a0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\9109.tmp"C:\Users\Admin\AppData\Local\Temp\9109.tmp" --splashC:\Users\Admin\AppData\Local\Temp\339578335d562261768d729fa085b4a0N.exe A2EDCA59385B6803A71BB59C8F3B8E42DE960FCE0DDC410581F1DEA4097F8BDC60D923AC19734C0155F3342E86A1CAB48149E9F39609BA7F28D9D0F93BFDEF8A2⤵
- Deletes itself
- Executes dropped EXE
PID:1432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD513290d3bfe84198711811ee7ef49ad7e
SHA1046753709d8b213b5720926ededcb96333b60c73
SHA256cb208fbb96bb3a8b27c40a40f2b02cec6972a662bb3570e34c722892d01870e0
SHA5125aabc63739560f343b365da8d638720b47613f2e2956f1bbe73acbfd940fb84e9e446bc7857b5a114c77692225abac7845daf6a02677e5e37940e97af5fd8eff