Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe
Resource
win10v2004-20240802-en
General
-
Target
641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe
-
Size
7.4MB
-
MD5
4109a3e122059bd865412074c51f709a
-
SHA1
b8f64cd4c7f680fb37195b4a3c21ab46d6e2a88a
-
SHA256
641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da
-
SHA512
e5864faf06d83a3a3be3172c1f1b3c334d07834d062c6e4039d524a36b60f0966115c3ccec3c32f352f87a29b9005485dc16c193b128e3493b8be95c1bbeee4b
-
SSDEEP
98304:n185XcfbeVJlne5yXw8sXYlIEJfRSZTWjZ4LWOKVHfTRsU01IqCoI4GRR+EeV7:uqCJIB8LXRe8Z43CSU01IqM4GRR+EO
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe 2708 641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe"C:\Users\Admin\AppData\Local\Temp\641fe33dcfee2baa4d3af94138a9001c8f1ef7e6efad23f62bd88e1e182405da.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2708