Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
84628cf449b946858edb8b47c431ceb0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84628cf449b946858edb8b47c431ceb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
84628cf449b946858edb8b47c431ceb0N.exe
-
Size
88KB
-
MD5
84628cf449b946858edb8b47c431ceb0
-
SHA1
cc2e58ad0b158334ae04c1a2e9e5737d33020692
-
SHA256
1d7c69623517e502ad3d3215a33db87505b1858fd1eddf2e9470907152aa2678
-
SHA512
b492c298bef271e26d2c2311a04a11c668b7d3a42247fc21a18d7205bb050312da5a3406908df11ac488b8705bc2ed5b56d9395328ca5108dd690779d5f191a2
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBlX:vCjsIOtEvwDpj5H9YvQd21
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2320 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1648 84628cf449b946858edb8b47c431ceb0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84628cf449b946858edb8b47c431ceb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2320 1648 84628cf449b946858edb8b47c431ceb0N.exe 31 PID 1648 wrote to memory of 2320 1648 84628cf449b946858edb8b47c431ceb0N.exe 31 PID 1648 wrote to memory of 2320 1648 84628cf449b946858edb8b47c431ceb0N.exe 31 PID 1648 wrote to memory of 2320 1648 84628cf449b946858edb8b47c431ceb0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\84628cf449b946858edb8b47c431ceb0N.exe"C:\Users\Admin\AppData\Local\Temp\84628cf449b946858edb8b47c431ceb0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD56084599515081acc9e6d038879095158
SHA15b1bef54062e0dc27fbca38b94503d9ecf00c60e
SHA25635b6b05bd488ce68cd4962ddd3ae94a494033f72e752b106b421415a7cd686e3
SHA512f1933340358c7872db8cdc933e4fbc53bafa79e0542f1da36a977909a32ff880718846ec349c62ed8cfd8670c6f302d04a6aec6935d3ad01afe447d322f19848