Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe
Resource
win10v2004-20240802-en
General
-
Target
32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe
-
Size
1023KB
-
MD5
e49f495e3b04a4aa1a4c85c3d6e6b5e0
-
SHA1
8154f50d595fbf4ad22f813ee909e6e186976bca
-
SHA256
32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665
-
SHA512
29a5156917dce6707710be325e49a793f31f77ad20cff54615647b8edbfa7d22e11811cc7a0593db4af4acbea7fc2cbb327a1e53c0628e283824bdd3ade30923
-
SSDEEP
3072:3y0N8hFl0Z9LAQ7EMImitLuI1OsOy7WjcV0p1CpvHLa36DlNa0FNUITFB9dHltrr:3y0NqWZ9UpXN9EsOsV0kdlNa0gI7F1
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\runouce.exe 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe File created C:\Windows\SysWOW64\runouce.exe 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2300 1532 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe 29 PID 1532 wrote to memory of 2300 1532 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe 29 PID 1532 wrote to memory of 2300 1532 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe 29 PID 1532 wrote to memory of 2300 1532 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe 29 PID 1532 wrote to memory of 1244 1532 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe 21 PID 1532 wrote to memory of 1244 1532 32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe"C:\Users\Admin\AppData\Local\Temp\32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe"C:\Users\Admin\AppData\Local\Temp\32226673e2ad95313b503f31908bd91da27a514ee8a7b257a63d2435c6459665N.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-