Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 00:51
Behavioral task
behavioral1
Sample
ba93f77d1a5ea6e0167b22431de94d20N.exe
Resource
win7-20240708-en
General
-
Target
ba93f77d1a5ea6e0167b22431de94d20N.exe
-
Size
189KB
-
MD5
ba93f77d1a5ea6e0167b22431de94d20
-
SHA1
1295d9118cf67f4e068319d72138a80494630b02
-
SHA256
c311cf252c921f62bdb62ec764fe72e9bb58e6d73d32de213ba78943a76ab9b7
-
SHA512
8e4068f8f3f37684eea71e65b319841bb49c9067bca21efb3e5e61219dbce7d0660fe5ec88585d9a521cfafb2f5d88f6eb09643ed26eb4b9c040fbe119090340
-
SSDEEP
3072:KBf5OYpgK2+49WqfOIbA099oey1r45340VJ96dLtMW1d73bR7SgOBzvVg6UU62:afjpgFP9W+bAWoesrU40p61tL73blqKK
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2320-5-0x0000000000400000-0x0000000000437000-memory.dmp family_xworm -
Executes dropped EXE 1 IoCs
pid Process 1944 CrackLauncher.exe -
Loads dropped DLL 2 IoCs
pid Process 2320 ba93f77d1a5ea6e0167b22431de94d20N.exe 1936 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba93f77d1a5ea6e0167b22431de94d20N.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347 CrackLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CrackLauncher.exe" CrackLauncher.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347\DefaultIcon CrackLauncher.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347\shell\open\command CrackLauncher.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347\shell CrackLauncher.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347\shell\open CrackLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CrackLauncher.exe" CrackLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347\ = "URL:Run game 1199748644409184347 protocol" CrackLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\discord-1199748644409184347\URL Protocol CrackLauncher.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1944 2320 ba93f77d1a5ea6e0167b22431de94d20N.exe 29 PID 2320 wrote to memory of 1944 2320 ba93f77d1a5ea6e0167b22431de94d20N.exe 29 PID 2320 wrote to memory of 1944 2320 ba93f77d1a5ea6e0167b22431de94d20N.exe 29 PID 2320 wrote to memory of 1944 2320 ba93f77d1a5ea6e0167b22431de94d20N.exe 29 PID 1944 wrote to memory of 820 1944 CrackLauncher.exe 31 PID 1944 wrote to memory of 820 1944 CrackLauncher.exe 31 PID 1944 wrote to memory of 820 1944 CrackLauncher.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba93f77d1a5ea6e0167b22431de94d20N.exe"C:\Users\Admin\AppData\Local\Temp\ba93f77d1a5ea6e0167b22431de94d20N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5c137c5f5287d73a94d55bc18df238303
SHA195b4b01775bea14feaaa462c98d969eb81696d2c
SHA256d294856177658df0159cfe937e5ea95a8ee8a2ca85754d897aea3bb5d0d962c0
SHA512ba595d185ae98152658ce95964fd6bcce7e970896b0b1c674a142d126cf0433094debcd25527d9b4f5a6568cc5a8a42aeaef536166748eea3973f8b694564aa5