Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
9c1cb3a96c796caf8196e57094ea53b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c1cb3a96c796caf8196e57094ea53b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9c1cb3a96c796caf8196e57094ea53b0N.exe
-
Size
61KB
-
MD5
9c1cb3a96c796caf8196e57094ea53b0
-
SHA1
83f50af99472906fbf5daa12cb723df7e3616991
-
SHA256
adb7935add7f70d61e250c4edf5dceeed3b6ce1904c94cbcbdb4fc1147e9c1d8
-
SHA512
b4d186114089b5065a0038fa4adc6f5ecb025e2bc8fc434fbf54f5f4a591b50823e2a4f178aa6f2c3fffe2408c6a8244e4161ef5480390c1406ffc5784625e3a
-
SSDEEP
768:MApQr0DHvdFJI34nGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7As+F:MAaAJlzsh7pWezEPJB+Oo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1828 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 2272 9c1cb3a96c796caf8196e57094ea53b0N.exe 2272 9c1cb3a96c796caf8196e57094ea53b0N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 9c1cb3a96c796caf8196e57094ea53b0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c1cb3a96c796caf8196e57094ea53b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sal.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1828 2272 9c1cb3a96c796caf8196e57094ea53b0N.exe 30 PID 2272 wrote to memory of 1828 2272 9c1cb3a96c796caf8196e57094ea53b0N.exe 30 PID 2272 wrote to memory of 1828 2272 9c1cb3a96c796caf8196e57094ea53b0N.exe 30 PID 2272 wrote to memory of 1828 2272 9c1cb3a96c796caf8196e57094ea53b0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c1cb3a96c796caf8196e57094ea53b0N.exe"C:\Users\Admin\AppData\Local\Temp\9c1cb3a96c796caf8196e57094ea53b0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD53e7d62552e8d40203c8d890fa77f8b68
SHA1d8b35df541e2fdfd5685331e75a9bfd6322d95d2
SHA2562463e2d4226b3e130c4a180af0583e2040a8710406058a0d5c90ae49f94c3547
SHA512fd66a613d122c5eb6b5ffdb037296be5c56287057048104fbb1117cef7beb2b10a21ef00d4aa36b8b8248de25c1f2cbc02a388a0e647c21e660f9f22878c30fe