Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
Setup Fresh Air v1.0.9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup Fresh Air v1.0.9.exe
Resource
win10v2004-20240802-en
General
-
Target
Setup Fresh Air v1.0.9.exe
-
Size
49.1MB
-
MD5
ccccee41d152c7396d64f3a42288a884
-
SHA1
1692cc3828b64414ba3d67c9d71d9f63a42d621a
-
SHA256
df145197956253d1b8dad13fbc1fe834f7759e7932ee446573cf6ea817710c29
-
SHA512
5ad4ba70e5bd1131d452e19fc6c8af8e394e8ae4e347df07522fb18e84713ce3541a0d8012e9e5d9c278c49ad220e033bc3233fa8d518fae4738835bd0c0d213
-
SSDEEP
786432:nD+F5RtCP+6j/1Hb5sIJwzqtd5bsXRGolzC8tySERKixSUXMo:nD+F5RgG6j/1H9RwzqtvsXRGolzzER2U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2228 Setup Fresh Air v1.0.9.tmp -
Loads dropped DLL 5 IoCs
pid Process 1580 Setup Fresh Air v1.0.9.exe 2228 Setup Fresh Air v1.0.9.tmp 2228 Setup Fresh Air v1.0.9.tmp 2228 Setup Fresh Air v1.0.9.tmp 2228 Setup Fresh Air v1.0.9.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\VST3\Slate Digital\is-ME1IE.tmp Setup Fresh Air v1.0.9.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup Fresh Air v1.0.9.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup Fresh Air v1.0.9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 Setup Fresh Air v1.0.9.tmp 2228 Setup Fresh Air v1.0.9.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 Setup Fresh Air v1.0.9.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 Setup Fresh Air v1.0.9.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2228 1580 Setup Fresh Air v1.0.9.exe 29 PID 1580 wrote to memory of 2228 1580 Setup Fresh Air v1.0.9.exe 29 PID 1580 wrote to memory of 2228 1580 Setup Fresh Air v1.0.9.exe 29 PID 1580 wrote to memory of 2228 1580 Setup Fresh Air v1.0.9.exe 29 PID 1580 wrote to memory of 2228 1580 Setup Fresh Air v1.0.9.exe 29 PID 1580 wrote to memory of 2228 1580 Setup Fresh Air v1.0.9.exe 29 PID 1580 wrote to memory of 2228 1580 Setup Fresh Air v1.0.9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup Fresh Air v1.0.9.exe"C:\Users\Admin\AppData\Local\Temp\Setup Fresh Air v1.0.9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\is-UKC6C.tmp\Setup Fresh Air v1.0.9.tmp"C:\Users\Admin\AppData\Local\Temp\is-UKC6C.tmp\Setup Fresh Air v1.0.9.tmp" /SL5="$5014E,51031648,121344,C:\Users\Admin\AppData\Local\Temp\Setup Fresh Air v1.0.9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57e205adfcee22e6a7d8b8d40f4dff663
SHA17eabee772a70f3d4b75113a9cac711a4b8e941e4
SHA256ea82794e2fd5fd17dfab0151723e0420801d2e0844536008bd75582b389740df
SHA512aaffc0e94105df41445742577b15ab6a4fe97c6d58169a55789a4980570d3128b1114baaab0e9be6a8d1a571f988baae633c3ce7e43eb332db58118dd83cf93e
-
Filesize
357KB
MD5f30afccd6fafc1cad4567ada824c9358
SHA160a65b72f208563f90fba0da6af013a36707caa9
SHA256e28d16fad16bca8198c47d7dd44acfd362dd6ba1654f700add8aaf2c0732622d
SHA51259b199085ed4b59ef2b385a09d0901ff2efde7b344db1e900684a425fc2df8e2010ca73d2f2bffa547040cb1dd4c8938b175c463ccc5e39a840a19f9aa301a6c
-
Filesize
4KB
MD55df8ada84a16f5dfc24096ef90a5ce3a
SHA15e7e9c68119c3a0a1afc92c60674bc8714492823
SHA25648a9c8c332fde541b571d9d522d0e37834b452f55af8cbdc341b12222e78fb5b
SHA512661b5219c74dd6e3a8e899a1b1a3002689d148e337d7323a174519366c9548c284ee76e2faa2f9600cd483db21093ee62399f0d7403c39523c654266760191c2
-
Filesize
813KB
MD55f87caf3f7cf63dde8e6af53bdf31289
SHA1a2c3cc3d9d831acd797155b667db59a32000d7a8
SHA2564731982b02b067d3f5a5a7518279a9265a49fb0f7b3f8dc3d61b82a5359d4940
SHA5124875298d82037ef1fff1ee3c58a9059d8480274326c862729fcc56664ecb49e2692c3838948c66dc8336e4050469d831cbf1fbd79b66565ab673d2a67765109d
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb