Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 09:42

General

  • Target

    d469101177f6bf36c38755988485c255e2918304ad51d30b5ed76062a4e46382.exe

  • Size

    159KB

  • MD5

    70e0ec444e51ea02174ec13c02a9fb26

  • SHA1

    69ece913a8597d55722bad0f3c311da368923c6b

  • SHA256

    d469101177f6bf36c38755988485c255e2918304ad51d30b5ed76062a4e46382

  • SHA512

    e018598c1c0728ba81c5fea4c4f36864f195643d82236859ecb5031752df368b3eea81bb675a7784b2a0c7c537f65f0d7d1adccad4424433d757eee318b623fb

  • SSDEEP

    3072:xkY4k28GEHx1UG2c0IsWnR3FPy+3ZiA/kIKeI6+zCPLBNecbPdB+XGSlZ51Jd4+X:x3U8GER27c0ArBl/E6o4LBNecUeul

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d469101177f6bf36c38755988485c255e2918304ad51d30b5ed76062a4e46382.exe
    "C:\Users\Admin\AppData\Local\Temp\d469101177f6bf36c38755988485c255e2918304ad51d30b5ed76062a4e46382.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c whoami
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\whoami.exe
        whoami
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ipconfig /all
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /all
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        PID:2684
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c echo %USERPROFILE%\Desktop
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2780
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic diskdrive get serialnumber
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic diskdrive get serialnumber
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c systeminfo
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\systeminfo.exe
        systeminfo
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers system information
        PID:2692
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c dir C:\Users\Admin\\Desktop
      2⤵
      • System Location Discovery: System Language Discovery
      PID:448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads