Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
d3741e1a3c9f231cd062c4d3a7c6dee0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3741e1a3c9f231cd062c4d3a7c6dee0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d3741e1a3c9f231cd062c4d3a7c6dee0N.exe
-
Size
284KB
-
MD5
d3741e1a3c9f231cd062c4d3a7c6dee0
-
SHA1
9313241cf9634648de91f7b4c9f454a350023285
-
SHA256
69e421e4dcbac7fb00a0ea32b2382f1b0b742e2d6f921d55ecb5eb82608825a0
-
SHA512
efbd3cbe5303f1123b7945b0d116bc53bf6ba0f9a7d9d3d1aa2184b5cab95877655beb8db685297a3011a728cddd5cc7cdceca4f11ebc61e509003ed21ecd6f3
-
SSDEEP
6144:YCUgF0NMbSs9nSQK4uUk2PeAtbflwtGWqHHP2Xcb:YCziiSarnkTebfKwW2HPt
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2864 1448 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3741e1a3c9f231cd062c4d3a7c6dee0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1448 d3741e1a3c9f231cd062c4d3a7c6dee0N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1448 d3741e1a3c9f231cd062c4d3a7c6dee0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2864 1448 d3741e1a3c9f231cd062c4d3a7c6dee0N.exe 30 PID 1448 wrote to memory of 2864 1448 d3741e1a3c9f231cd062c4d3a7c6dee0N.exe 30 PID 1448 wrote to memory of 2864 1448 d3741e1a3c9f231cd062c4d3a7c6dee0N.exe 30 PID 1448 wrote to memory of 2864 1448 d3741e1a3c9f231cd062c4d3a7c6dee0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3741e1a3c9f231cd062c4d3a7c6dee0N.exe"C:\Users\Admin\AppData\Local\Temp\d3741e1a3c9f231cd062c4d3a7c6dee0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 2842⤵
- Program crash
PID:2864
-