Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe
Resource
win10v2004-20240802-en
General
-
Target
84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe
-
Size
51KB
-
MD5
d559829f41987a74b5f296332163d630
-
SHA1
e89ed54e458bb5d513ae9616d4a21f804b9a5eb4
-
SHA256
84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fc
-
SHA512
2b2398a2f4624817f26a0785c7170e53acb9ba67fd43504c373c6323caa40ebac8ce7bc507413dc43d586323f1f7db6ac996064a0d8a58faebfef3eee78fdfb6
-
SSDEEP
768:l2EMQWlqBxRlHzZN2zJo3LeivGnCoPToFr1tptjFhav:0lqBxRlHzZN2zSPvDoPTojtptjzi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2628 laccm.exe -
Loads dropped DLL 2 IoCs
pid Process 2324 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe 2324 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laccm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2628 2324 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe 29 PID 2324 wrote to memory of 2628 2324 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe 29 PID 2324 wrote to memory of 2628 2324 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe 29 PID 2324 wrote to memory of 2628 2324 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe"C:\Users\Admin\AppData\Local\Temp\84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\laccm.exe"C:\Users\Admin\AppData\Local\Temp\laccm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD511190e724f2ec337cf0388a316f715fd
SHA127ea1ee7b42608ebb28d539b96d28ac6fb5f26a2
SHA256a166330f44540cca5a8a4fb3f04b0ee814506bb37a9a7b178e140879586a63e3
SHA5124a29fdce7231d506751c5b49e5e18eb225174cc74883d6c3904006823381770e4f0f849667ddfff1c628828ce51976860fbc19424519ccbea53a3bd10cb7ec2f