Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe
Resource
win10v2004-20240802-en
General
-
Target
80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe
-
Size
490KB
-
MD5
8e1a8750a3231088a08cad532948b3c0
-
SHA1
7540db41f4f03d46559149c54b76e61c3d34013b
-
SHA256
80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6ac
-
SHA512
9680077948337dcf2bf2a90aec83c52157051a31bbd526e1930aaf17031bbd80a47bbffdb3d0f84b64c5816f963d6449fb352ac33a977ce5b1f8dff562eba9ca
-
SSDEEP
12288:4MKMxKOU2lU7LXCl8EzBbjEtyYRHQQsfs1v2v:XNB2XX1FwQsfs1K
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1300 80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe 1300 80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main 80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1300 80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1300 80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe 1300 80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe"C:\Users\Admin\AppData\Local\Temp\80f506a490c8029aa9f40a35990efea97bbdd727231e732d16629b70dfdbc6acN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD58b2376ab901ac90c9d8799f4b454b3de
SHA1fd78bfeabde021728698d35449344cc0372d696b
SHA256d2cbcf7da0e6d293519ac35cc3ca533375e1625df6afe00d917a7e3bcfecc662
SHA51288ee439ef4bbd9243bd27b3a76cca5706f3c15018364b925e3a673d3787444f2df68ff5fbba47f74056d50e569748df7800e2b4b49f373a26afa5c4dcd52d355