Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe
Resource
win10v2004-20240802-en
General
-
Target
60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe
-
Size
72KB
-
MD5
89de66008c5f1de3256daa24ef5bc590
-
SHA1
5c1acd24e7ec5b64c765f9d29919f2979b320aeb
-
SHA256
60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1
-
SHA512
9c348373f019d8e3051190d21f687d0f95fb3dc4b69da61718d71dd2ed31b81017dc9ceb45b9af5bc721dac7d90933b81b0680ddb73802d49c95b61b67bf0ecf
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/RK:vj+jsMQMOtEvwDpj5HZYTjipvF24i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2804 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2804 2424 60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe 30 PID 2424 wrote to memory of 2804 2424 60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe 30 PID 2424 wrote to memory of 2804 2424 60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe 30 PID 2424 wrote to memory of 2804 2424 60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe"C:\Users\Admin\AppData\Local\Temp\60d73e03aee7b4caf15261c5468d4310a261439684d4bcb4896c22bcf622bad1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d8dda095c9d9f3c5820a866aa94e9f80
SHA14a36cf2b8e44cfe31c5b0d78288b5722cfcf8163
SHA2566a319ffb43e4c10fbd819375ca6fb4b7301e1933c0fb2d2b9afc9b3a295ec062
SHA5129c1c2cd429c59b14668af6c6c56af37d3c7074fa35fea699d732c7afafd5d598e3547c8aba34b7ac59a7e195f13f711297d1bb6233ec5145acdf6a40da126dc6