Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 1287668565645647645647674456475467567657465476.scr
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RFQ 1287668565645647645647674456475467567657465476.scr
Resource
win10v2004-20240802-en
General
-
Target
RFQ 1287668565645647645647674456475467567657465476.scr
-
Size
1.6MB
-
MD5
25627c53238e2289a29f0c7d5d0553c5
-
SHA1
94d9ca78e77d31f5ccd514e2b58a5af31dfe67e7
-
SHA256
54a791a6660fd49d6e2378527b448fc71708360b46c9928fe6c53cb2d03f7791
-
SHA512
33b03efa11f5a758047842f5957d920c5a431ab0693c43c437c19aba1da829da12c94dfa2b9241c3851ef36ae3ba85757a18e55833a1ce3b3a363a647fa220e1
-
SSDEEP
24576:w9PT36SNwoOjFhirCf/KyJJqKBDEytmAYCOO5Jg8pQyk5qSGEl65OYaBNvyg:U+SNqTiO3h35TAYJg8GySNwg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Oeflhdwfd = "C:\\Users\\Admin\\AppData\\Roaming\\Oeflhdwfd.exe" RFQ 1287668565645647645647674456475467567657465476.scr -
Program crash 1 IoCs
pid pid_target Process procid_target 4656 2080 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 1287668565645647645647674456475467567657465476.scr -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2080 RFQ 1287668565645647645647674456475467567657465476.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 RFQ 1287668565645647645647674456475467567657465476.scr Token: SeDebugPrivilege 2080 RFQ 1287668565645647645647674456475467567657465476.scr -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4656 2080 RFQ 1287668565645647645647674456475467567657465476.scr 30 PID 2080 wrote to memory of 4656 2080 RFQ 1287668565645647645647674456475467567657465476.scr 30 PID 2080 wrote to memory of 4656 2080 RFQ 1287668565645647645647674456475467567657465476.scr 30 PID 2080 wrote to memory of 4656 2080 RFQ 1287668565645647645647674456475467567657465476.scr 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 1287668565645647645647674456475467567657465476.scr"C:\Users\Admin\AppData\Local\Temp\RFQ 1287668565645647645647674456475467567657465476.scr" /S1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 6322⤵
- Program crash
PID:4656
-