Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
911a8c5908c24be350337f2cb23cb7b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
911a8c5908c24be350337f2cb23cb7b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
911a8c5908c24be350337f2cb23cb7b0N.exe
-
Size
53KB
-
MD5
911a8c5908c24be350337f2cb23cb7b0
-
SHA1
6790ce1a87c05dea8f0690dfc62b1bd96335e599
-
SHA256
1c284c41ac1718876ade0ca63811425f081ea8ff3d78da2c5068fb358f170a21
-
SHA512
d1f5ba97d87c0edb3ba89e19350a6522be748b842e5d74dad69eaa16a7a96ef52a96e48800963bfe7fc24a8f8369127d0fc5a3ece62396e4c48418a0ab4bb12c
-
SSDEEP
768:RzG9lCapIyMsDlfjQelqYreP23SUx94NMyKZNu:g9lDpI4zFSUFXZNu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2380 hots.exe -
Loads dropped DLL 2 IoCs
pid Process 1064 911a8c5908c24be350337f2cb23cb7b0N.exe 1064 911a8c5908c24be350337f2cb23cb7b0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 911a8c5908c24be350337f2cb23cb7b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hots.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1064 911a8c5908c24be350337f2cb23cb7b0N.exe 2380 hots.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2380 1064 911a8c5908c24be350337f2cb23cb7b0N.exe 30 PID 1064 wrote to memory of 2380 1064 911a8c5908c24be350337f2cb23cb7b0N.exe 30 PID 1064 wrote to memory of 2380 1064 911a8c5908c24be350337f2cb23cb7b0N.exe 30 PID 1064 wrote to memory of 2380 1064 911a8c5908c24be350337f2cb23cb7b0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\911a8c5908c24be350337f2cb23cb7b0N.exe"C:\Users\Admin\AppData\Local\Temp\911a8c5908c24be350337f2cb23cb7b0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\hots.exe"C:\Users\Admin\AppData\Local\Temp\hots.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD564d50a9f0571d3fb320cf1f6fbae9d5d
SHA1bfe6b66ae80014d59d25d042d69150fa3de41da8
SHA256eefb330ad856ff6772dda6c4438eb6b902a06aca6cc73ba64cabbf4a1bfffd79
SHA512f2f3f499979d07269348c778e8ad40f54cc65ffd1657da7e8ab7007b43d01e9b8d77596c48d4e8dc07303f33350014d2822cb3251529f080b6679b4c7cd904ec