Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win10v2004-20240802-en
General
-
Target
out.exe
-
Size
96KB
-
MD5
f527b00720bc9af6ed28a6efa242355a
-
SHA1
a7ad18f3fd69a27627e5894273f0d57761c2bda8
-
SHA256
b6a17ffeb44a4aeb227e83ec739c1451945ef9e60f1b660fd52076aa1ee02f11
-
SHA512
f1895bd4464ec80caca237903cdb971b40458476a17047e6e25dc32f646496a4b9f0cce07c8c1e338f89b7a9927e3b390a6f37b054e8cbe185bb0478ab940cab
-
SSDEEP
1536:+JTlybjXwFcBLy5DJl7lSD0HwNaO3cclxQj+WSUrxXV3J10:+JQjgFuLypvJg0QNaO3cclxQj+WX1XVo
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 2772 2688 out.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language out.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 out.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2772 2688 out.exe 31 PID 2688 wrote to memory of 2772 2688 out.exe 31 PID 2688 wrote to memory of 2772 2688 out.exe 31 PID 2688 wrote to memory of 2772 2688 out.exe 31 PID 2688 wrote to memory of 2772 2688 out.exe 31 PID 2688 wrote to memory of 2772 2688 out.exe 31 PID 2688 wrote to memory of 2772 2688 out.exe 31 PID 2688 wrote to memory of 2772 2688 out.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\out.exe"C:\Users\Admin\AppData\Local\Temp\out.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\out.exeC:\Users\Admin\AppData\Local\Temp\out.exe2⤵PID:2772
-