Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
IDM_6.4x_Crack_v19.7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
IDM_6.4x_Crack_v19.7.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Setup/idman642build22.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Setup/idman642build22.exe
Resource
win10v2004-20240802-en
General
-
Target
Setup/idman642build22.exe
-
Size
11.7MB
-
MD5
d342739ae85e84dbb6602c388d5a347a
-
SHA1
d7969ebf3cca7f1f7480c8d4941adb0ad7fdfe40
-
SHA256
8c2d993b89a21b98d3bfdfa425cde853431f1e5e311954456393b218ab5513ce
-
SHA512
715d2949cc95ae92d6360846dad8569de509a6bf74903995556cdeceedb0f2f0ed8ba812b32dfa18b0f6d0cbc2cc7bae23c2a96cd864bbdecdd4c45711f3c94c
-
SSDEEP
196608:L/5p+6e05RM1a4+nlWa04WcNMnfZUT1JhH/TbrqafM3wZDUUDMBdD2pewf2RKjs:VxeCRM1a4SXpwQ1fL3q7AZIvdKpb+Ss
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1860 IDM1.tmp -
Loads dropped DLL 1 IoCs
pid Process 2068 idman642build22.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDM1.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idman642build22.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1860 2068 idman642build22.exe 30 PID 2068 wrote to memory of 1860 2068 idman642build22.exe 30 PID 2068 wrote to memory of 1860 2068 idman642build22.exe 30 PID 2068 wrote to memory of 1860 2068 idman642build22.exe 30 PID 2068 wrote to memory of 1860 2068 idman642build22.exe 30 PID 2068 wrote to memory of 1860 2068 idman642build22.exe 30 PID 2068 wrote to memory of 1860 2068 idman642build22.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup\idman642build22.exe"C:\Users\Admin\AppData\Local\Temp\Setup\idman642build22.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp"C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD51c734d0ded634d8e17a87aba3d44f41d
SHA14974769d1b1442c48dd6b6fb8b3741df36f21425
SHA256645ee6e64ed04825b25964d992d0205963498bb9d61f5a52be7e76ddb2074003
SHA51220239782f4e30157fdfc02a3793ac7bde7ed74400de4cffa812805d680789ea7be5c2c765924d32f74807d80100cccc14b453d3d7e006dd4aeee60dec98af4c9