Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe
Resource
win10v2004-20240802-en
General
-
Target
9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe
-
Size
79KB
-
MD5
30c4891d202675a788d675ab1e1864e0
-
SHA1
6cc9dd73cf42197d30b9ddc52dfe5b3872d0f11e
-
SHA256
9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9a
-
SHA512
7c058f2b68d39489b3d2bcfaee235f98d9a6acf96bb4960e38508c28b5e609d1a614cb7fe9b18fc1344fe28927b1ae5553984fd8dabf28789908c610be8e91b1
-
SSDEEP
1536:zvvSjrPgawlHWzMLP0OOQA8AkqUhMb2nuy5wgIP0CSJ+5yKB8GMGlZ5G:zvvSj8aKHWgLP0bGdqU7uy5w9WMyKN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 372 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2640 cmd.exe 2640 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2640 2164 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe 32 PID 2164 wrote to memory of 2640 2164 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe 32 PID 2164 wrote to memory of 2640 2164 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe 32 PID 2164 wrote to memory of 2640 2164 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe 32 PID 2640 wrote to memory of 372 2640 cmd.exe 33 PID 2640 wrote to memory of 372 2640 cmd.exe 33 PID 2640 wrote to memory of 372 2640 cmd.exe 33 PID 2640 wrote to memory of 372 2640 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe"C:\Users\Admin\AppData\Local\Temp\9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5688402dba1b66d1831306fd3f69750b5
SHA1542e95b8aa52a5d1a4f2808e153045744334d293
SHA2569d52a83f8e2d303ce2b2e316125f05157f844c641b075773ae7662bdbc833ebc
SHA512983023a36a6024c30820681f8bf5df7eca2bc65666a8698622dce0a02b4019c5001d65057e92e8e76f8b154cbd013916d57431017eb42ba444823b15c4c394ed