Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
details.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
details.exe
Resource
win10v2004-20240802-en
General
-
Target
details.exe
-
Size
84KB
-
MD5
d3a8b3dcde44b81c0e69cc2a8a36e844
-
SHA1
5f0acca868adf8a3878270194e48db674dcf360c
-
SHA256
e921404d6c4224486ec3ad2cfb2712d2dd628c586bd42e94fdbd021db7576016
-
SHA512
9b757944c392f0c2b252ac1d27f3d30a1b3d200271ff6c3984f97ff619d2e5f3ae53102e5962a947a72138f4fb5d9976363c4719fe0e5b1dfa71c669a1453a96
-
SSDEEP
1536:8uGysa3E+EznfRASJBA+9PfaFYHZ9qJfq8lHrRf2QeCTscXyv3g0XP46NCHEKS62:j07zpjBP9XOkZ958lHrN2QicCo0f46tT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1756 winssk32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SSK Service = "C:\\Windows\\winssk32.exe" details.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\SSK Service = "C:\\Windows\\winssk32.exe" details.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winssk32.exe details.exe File opened for modification C:\Windows\winssk32.exe details.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winssk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language details.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 1756 2560 details.exe 30 PID 2560 wrote to memory of 1756 2560 details.exe 30 PID 2560 wrote to memory of 1756 2560 details.exe 30 PID 2560 wrote to memory of 1756 2560 details.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\details.exe"C:\Users\Admin\AppData\Local\Temp\details.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\winssk32.exeC:\Windows\winssk32.exe dwaqr2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5d3a8b3dcde44b81c0e69cc2a8a36e844
SHA15f0acca868adf8a3878270194e48db674dcf360c
SHA256e921404d6c4224486ec3ad2cfb2712d2dd628c586bd42e94fdbd021db7576016
SHA5129b757944c392f0c2b252ac1d27f3d30a1b3d200271ff6c3984f97ff619d2e5f3ae53102e5962a947a72138f4fb5d9976363c4719fe0e5b1dfa71c669a1453a96