Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
5.3MB
-
MD5
ec546f83bfa166e70f67934a0d841d66
-
SHA1
8bcc9530dd114e741abc7a31d5c720f6f7d4a9c6
-
SHA256
74eea2a94a568a7c2a6d58f5d7c6b03caef2dc6307faa9e9881011b585eddc94
-
SHA512
d33f85e5622b2f5a5eff75d81d109fc59b38fc668657a1406ac39a3f7f9c2436bed7268f461717cd344f8c0d11b7f3cbb2d65791b0b877e1309b495dc0c41079
-
SSDEEP
98304:FCusI+4xOCNvSAhYmXeqmNjIj8zgeqTMYgidUr65lKLK/ZiiJ:0/I+4RrhxXeqmfhodUrXbO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2416 file.tmp -
Loads dropped DLL 5 IoCs
pid Process 940 file.exe 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.tmp -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp 2416 file.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2416 file.tmp 2416 file.tmp 2416 file.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 940 wrote to memory of 2416 940 file.exe 31 PID 940 wrote to memory of 2416 940 file.exe 31 PID 940 wrote to memory of 2416 940 file.exe 31 PID 940 wrote to memory of 2416 940 file.exe 31 PID 940 wrote to memory of 2416 940 file.exe 31 PID 940 wrote to memory of 2416 940 file.exe 31 PID 940 wrote to memory of 2416 940 file.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\is-3E5K1.tmp\file.tmp"C:\Users\Admin\AppData\Local\Temp\is-3E5K1.tmp\file.tmp" /SL5="$3014E,5220215,67072,C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
913KB
MD5a0682e0aed2a0e26fd5d12bf9076b926
SHA19683803430e8688ea01fa3cfa435e5d2a5a6fbdd
SHA256b6c4cea25bd6e86dd19bc820ba274608a51caf62ea48d32f2f5e9e3d61c17f0e
SHA5129e74d6f141ef2dee99843778d3399cfc2198951a90bb699f135749df6a24b707c024df16aaaa00e2b57d96e7571541fe55b4cfd052f72cf1280761978e92870a
-
Filesize
66KB
MD586a1311d51c00b278cb7f27796ea442e
SHA1ac08ac9d08f8f5380e2a9a65f4117862aa861a19
SHA256e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d
SHA512129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3