Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 09:02 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d4bd92ebb64055e6fd76f2132a6325b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4bd92ebb64055e6fd76f2132a6325b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d4bd92ebb64055e6fd76f2132a6325b0N.exe
-
Size
2.6MB
-
MD5
d4bd92ebb64055e6fd76f2132a6325b0
-
SHA1
c548723eafb2045778bb53d858a4aa41635a07ef
-
SHA256
dd7cd49d92b036b3d334fe7680abe0cf6e13d066ac5e90e2003900214170c42b
-
SHA512
1bfbe9ab824f650246f06b468372c17a6128fd074e1bfe752156efbc798c67dc570ec026de6d064d43c882f1a1ef777e0e136f13f7e5bc9dc7bf560edd823312
-
SSDEEP
49152:oDy796EvMtTx435MtV+On5vMNbcwO6m2zGKYraTh+ZTOdFrxviiBI1rs:f7AEvgVOA5WbcoHzGlr8h+5q4if
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp 2844 WMF.exe -
Loads dropped DLL 5 IoCs
pid Process 2996 d4bd92ebb64055e6fd76f2132a6325b0N.exe 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4bd92ebb64055e6fd76f2132a6325b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4bd92ebb64055e6fd76f2132a6325b0N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMF.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2844 WMF.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3020 2996 d4bd92ebb64055e6fd76f2132a6325b0N.exe 28 PID 2996 wrote to memory of 3020 2996 d4bd92ebb64055e6fd76f2132a6325b0N.exe 28 PID 2996 wrote to memory of 3020 2996 d4bd92ebb64055e6fd76f2132a6325b0N.exe 28 PID 2996 wrote to memory of 3020 2996 d4bd92ebb64055e6fd76f2132a6325b0N.exe 28 PID 2996 wrote to memory of 3020 2996 d4bd92ebb64055e6fd76f2132a6325b0N.exe 28 PID 2996 wrote to memory of 3020 2996 d4bd92ebb64055e6fd76f2132a6325b0N.exe 28 PID 2996 wrote to memory of 3020 2996 d4bd92ebb64055e6fd76f2132a6325b0N.exe 28 PID 3020 wrote to memory of 2844 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp 29 PID 3020 wrote to memory of 2844 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp 29 PID 3020 wrote to memory of 2844 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp 29 PID 3020 wrote to memory of 2844 3020 d4bd92ebb64055e6fd76f2132a6325b0N.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4bd92ebb64055e6fd76f2132a6325b0N.exe"C:\Users\Admin\AppData\Local\Temp\d4bd92ebb64055e6fd76f2132a6325b0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\is-KVC3V.tmp\d4bd92ebb64055e6fd76f2132a6325b0N.tmp"C:\Users\Admin\AppData\Local\Temp\is-KVC3V.tmp\d4bd92ebb64055e6fd76f2132a6325b0N.tmp" /SL5="$40150,2357949,153088,C:\Users\Admin\AppData\Local\Temp\d4bd92ebb64055e6fd76f2132a6325b0N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\is-V9QGU.tmp\WMF.exe"C:\Users\Admin\AppData\Local\Temp\is-V9QGU.tmp\WMF.exe" /aid=0 /sub=0 /sid=90 /name="the_big_short__inside_the_doomsday_machi_-_michael_lewis.epub" /fid= /stats=n8265wTmoD0l8vPuuzlPINkaNcD/2aLMiYLM2IvKgtbM3K9Dvi6ihJ2RVYfGFE9NIdMqdn490Hvbk3L7vGCfBw== /param=03⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
Network
-
Remote address:8.8.8.8:53Request1.list.fullmedialibrary.comIN AResponse
-
Remote address:8.8.8.8:53Requestmfapi.comIN AResponsemfapi.comIN A45.33.23.183mfapi.comIN A173.255.194.134mfapi.comIN A45.56.79.23mfapi.comIN A198.58.118.167mfapi.comIN A45.33.2.79mfapi.comIN A45.33.18.44mfapi.comIN A45.33.20.235mfapi.comIN A72.14.185.43mfapi.comIN A45.79.19.196mfapi.comIN A96.126.123.244mfapi.comIN A45.33.30.197mfapi.comIN A72.14.178.174
-
Remote address:45.33.23.183:80RequestGET /?action=log&category=MF_micro_install 1.0.0.8&event=MicroInstaller&label=Start HTTP/1.0
Host: mfapi.com
Keep-Alive: 300
Connection: keep-alive
User-Agent: MicroInstaller
ResponseHTTP/1.1 400 Bad request
Cache-Control: no-cache
Connection: close
Content-Type: text/html
-
504 B 379 B 7 4
HTTP Request
GET http://mfapi.com/?action=log&category=MF_micro_installHTTP Response
400
-
73 B 146 B 1 1
DNS Request
1.list.fullmedialibrary.com
-
55 B 247 B 1 1
DNS Request
mfapi.com
DNS Response
45.33.23.183173.255.194.13445.56.79.23198.58.118.16745.33.2.7945.33.18.4445.33.20.23572.14.185.4345.79.19.19696.126.123.24445.33.30.19772.14.178.174
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54c219b78a305d3e52c811542154bb224
SHA17efe3e383b29c808cfb3ad0fd90d627ea7b2b2bf
SHA256a0dbdc08f771e32a5ef06f47b436afb270e860578971a974db0c34c0c1366a7c
SHA512bced9584568b011c0b2013e48d6b9503f77b01c57e2049722326a40363ce42c533e590c4583cf0cf3a5391f3208db8135b5afdc27ae7359af3ded66b11e628b8
-
Filesize
1.1MB
MD58811a0652c18dbcf68955f99df537eb8
SHA170cff6c43c0f873295dc085018639dff02f33012
SHA256d69f51e65e3944891ec9c392b3d7410d81f8f93e55b9071584bfd1d384862230
SHA512ed2ff6cfe272a8ae260233a1bb653adc0eaae13388418a9dea692b9924999d89b8677b8669fa24dcb0c606cfca7045bef779e1c58547f3f17d5096cbbe31d60a
-
Filesize
3.4MB
MD54c77196ae965e00a0ab6a1e3b3e4212d
SHA170e1a827223c352fabd41f659220a528b33de320
SHA256394574c33ab45971acc0a4840fa163a8d9884f9ebefe6b252d400544c34d0048
SHA5127889c1c1272259637f315cb64451b03b4b803d494b557d73ad97f906ef2c4831824e2355cd811d098ab7c35b81de3bf3a938ce80d442dd67b8e50d64571fda36
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3