Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe
Resource
win10v2004-20240802-en
General
-
Target
644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe
-
Size
53KB
-
MD5
004e4ef66887ced58bfb878c30803730
-
SHA1
ae2ce774aedff69a9dd9eab6791dcc658e7e1900
-
SHA256
644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811
-
SHA512
23770719f5a80111d468f5ab98d708aacc87516598b4fbc6b08dce72736b4ed37e98d6af8e034267d55efa98b9ee22002683f18547dd340894b5ab9e95cb1353
-
SSDEEP
1536:aNTg8r8QJR+kGFdO7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:C+kHJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2592 mzqoij.exe -
Loads dropped DLL 7 IoCs
pid Process 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2028 2220 WerFault.exe 29 2816 2592 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mzqoij.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 2592 mzqoij.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2592 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 30 PID 2220 wrote to memory of 2592 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 30 PID 2220 wrote to memory of 2592 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 30 PID 2220 wrote to memory of 2592 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 30 PID 2220 wrote to memory of 2028 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 31 PID 2220 wrote to memory of 2028 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 31 PID 2220 wrote to memory of 2028 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 31 PID 2220 wrote to memory of 2028 2220 644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe 31 PID 2592 wrote to memory of 2816 2592 mzqoij.exe 32 PID 2592 wrote to memory of 2816 2592 mzqoij.exe 32 PID 2592 wrote to memory of 2816 2592 mzqoij.exe 32 PID 2592 wrote to memory of 2816 2592 mzqoij.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe"C:\Users\Admin\AppData\Local\Temp\644b08d376383fffa19d8fa60cf0dbbf5705fae34940c4ed9d52c50a04f28811N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\mzqoij.exe"C:\Users\Admin\mzqoij.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 5282⤵
- Program crash
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD576c10803ec79ad0cdb794777b1a4d01d
SHA1c200f1e7378c519ff4c56a3a51deca474055b503
SHA256657263115017c373196ac949540a1f903ff4304917bfadb52b7cf710ebb56353
SHA5129c025b120223bf8a160bbe0bb1bb6546f7f97ac9cd625ec2d7c6024aadb22049949b2fdccf9e208d99c26b08065326dd981b5c1960abcae69ea30cc279b99571