Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 18:00

General

  • Target

    b042426e8a30b6ecf6e44f2b21138560N.exe

  • Size

    82KB

  • MD5

    b042426e8a30b6ecf6e44f2b21138560

  • SHA1

    99f9e5a21b4719cb9b4627897d398fe083e8cade

  • SHA256

    be58a027ae8df7933a92acd5190c1e2775c3e4137e126fd1456b01c0b4a6f069

  • SHA512

    dc86c047cd17d27832cdbf2ded7f65fa93047622d9b87ace822fd9d5dc2586aed086f1b67f23708d4336b955df9d87b42eb52dfe4682432d3b8730a98cfca4e5

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOzr9/q9:GhfxHNIreQm+Hi8r9/q9

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b042426e8a30b6ecf6e44f2b21138560N.exe
    "C:\Users\Admin\AppData\Local\Temp\b042426e8a30b6ecf6e44f2b21138560N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    78KB

    MD5

    c5a219f118245bed951796588f5c3810

    SHA1

    08a7449696f37d7328761752d9ba44cde898efba

    SHA256

    9f83c9fb07ec7503eb9dc1409ae20176a4dca9334fe220c3134dc79071321759

    SHA512

    976f810fea22d7261bb9bddedcfff8b163e143fb6b0b6288db73bea0f931f2dd4245a2b22ff724d6ca85048414c691c9264c7bb9e70319276421c07e5392ffe0

  • \Windows\system\rundll32.exe

    Filesize

    80KB

    MD5

    1e2092d5f3f3d884fe671de81e376468

    SHA1

    b41aa683a6c2c342253a2f5fe49b89520958be3e

    SHA256

    ba9b9daeb1976999c96a3de51e2f3aaa75eb37d1094020f9c7ae527913899f8f

    SHA512

    484c55db804e769f1968d835d4d44d9a77d0614ccd44cd2309dcd025685b9b5794820914179636f09c4869eb55b2e38f7fb8683761a03793aa847922d3f7f552

  • memory/2744-18-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2744-22-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2932-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2932-11-0x0000000000260000-0x0000000000276000-memory.dmp

    Filesize

    88KB

  • memory/2932-20-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2932-21-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB