Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
a1d8d7612dcefdb59e63f1742fad2e30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1d8d7612dcefdb59e63f1742fad2e30N.exe
Resource
win10v2004-20240802-en
General
-
Target
a1d8d7612dcefdb59e63f1742fad2e30N.exe
-
Size
46KB
-
MD5
a1d8d7612dcefdb59e63f1742fad2e30
-
SHA1
f6c973ecf6e1ebf4b54257831504ee287b069104
-
SHA256
6c8b6c0a1581a87f68fce1a7b42fc7e96a9fdea9bb0396ddcabaf9b09970b4b2
-
SHA512
9150e63ca89295c67ed376e3820d19e2ef3b6366b01843cf99b871d3d976c116b21360c101adf28aa54934ecb3d2495ba7cc928812c3497d9391e206fe4f892e
-
SSDEEP
768:DaP8mckxIrafCtdgI2MyzNtRQtONlIwoHNV2XBFV72B4lA7cN5Ze6/OVgXqCL0hw:Da0mc7ufCtdgI2MyzNtRQtONlIwoHNVk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 hhcbrnaff.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 a1d8d7612dcefdb59e63f1742fad2e30N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1d8d7612dcefdb59e63f1742fad2e30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhcbrnaff.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2388 3048 a1d8d7612dcefdb59e63f1742fad2e30N.exe 30 PID 3048 wrote to memory of 2388 3048 a1d8d7612dcefdb59e63f1742fad2e30N.exe 30 PID 3048 wrote to memory of 2388 3048 a1d8d7612dcefdb59e63f1742fad2e30N.exe 30 PID 3048 wrote to memory of 2388 3048 a1d8d7612dcefdb59e63f1742fad2e30N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d8d7612dcefdb59e63f1742fad2e30N.exe"C:\Users\Admin\AppData\Local\Temp\a1d8d7612dcefdb59e63f1742fad2e30N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5aede3dd551ce1b6bdb2a55d07265a3c0
SHA158ce722f7657b60ab6fead67bfe6667aa47a7c2b
SHA25636ef42a9583be38b863b8bdc72d65126f4f0125ba5e27edec457114237b50206
SHA512886bfccfebc90b7ee9737a35925e2416a17d02592336d1ab31a06fe14deb208ee3c8e1017f9a01528d8d82c71ba7148507323557586b0b3d5c8fb86f6c871ec6