Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe
Resource
win7-20240903-en
General
-
Target
075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe
-
Size
92KB
-
MD5
e17c510837714971ae56bd5dd23f5570
-
SHA1
d681e4255575a2e9a80857466730d368c8002f44
-
SHA256
075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3
-
SHA512
0819caa0987e320b831d1fc7973ad95bf29eb2f8879e10feb0c11604c1ae997750e2722403e4fc48b732b6432bde561391f15a46bbcb2f221ba806f052ae6d92
-
SSDEEP
1536:1WEhM021xdKDx3DcEuNIU9/lhAHPUcgMeWp8ANkMgB1iQdbiiSKL:1WEhMTq3DcEHU3yPUpMeDANkMgXiQdbF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2380 154.exe -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral1/files/0x000700000001945c-12.dat pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 154.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2076 AcroRd32.exe 2076 AcroRd32.exe 2076 AcroRd32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2380 2104 075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe 30 PID 2104 wrote to memory of 2380 2104 075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe 30 PID 2104 wrote to memory of 2380 2104 075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe 30 PID 2104 wrote to memory of 2380 2104 075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe 30 PID 2104 wrote to memory of 2076 2104 075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe 31 PID 2104 wrote to memory of 2076 2104 075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe 31 PID 2104 wrote to memory of 2076 2104 075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe 31 PID 2104 wrote to memory of 2076 2104 075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe"C:\Users\Admin\AppData\Local\Temp\075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\154.exe"C:\Users\Admin\AppData\Local\Temp\154.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\KPSS HAZIRLIK KAYNAK LİSTESİ.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58a1343a147c5a257de0a5d8ca5098c2a
SHA1210ffb3647434c05cbc95c12a7f8fbcf924c5fd4
SHA256de4ef54cdde49c897203985f49a07d52c9909f671d66d9b861066056ef20f47b
SHA512ef993a60cd15b90c04c34f7bfe852e16691975902ab8f24239a972097c33db94ff1759584d5e1af2e0a852c7bc08ebb509bfac3c9a34b5a8dda3711294078d4b
-
Filesize
51KB
MD5656ec9e216b73a5f14904bce0f814bc8
SHA16308069f9a03b64320301389f76efce9b1654b43
SHA2560b594ff40f2165dac3a1d051f2917d8ab7d6dbc759b2d241af2c672d928c9aa3
SHA512724ccd3c2f3be60134792605564fb4c8025bb39a2f640c6c3c8450cdf91b99d20bd22b039962c582b7a9ea8984dbad48cce2e09bf13b7155c8c3dac6ea59dad9
-
Filesize
3KB
MD5bbde3c1d6b2dfde9367070e52736d8cf
SHA1c65b9cadb821c60f1f00d3ec776375382b17aed7
SHA25633c2b040b486d373b543ac105ead20cae0f3be10532a8908d9681fcc6661c34e
SHA512d5c89bb208fc3d9f7b9c69f869413e8804799d25d9cbf0ac1e35b0fb512ca79ae91ceddcc35b17ae66a368a1553523e0d4683d9e6f2525fd6b6a09f8697aa7e7