Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe
Resource
win10v2004-20240802-en
General
-
Target
b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe
-
Size
6.4MB
-
MD5
156924e27f163099e490a991c5a54f70
-
SHA1
53b86ca2559673b41a9a976cc48d2477856c50f0
-
SHA256
b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2
-
SHA512
fcd93d526514d948af758df62baf03519b8517080dd29e8937387aa0d16bf75516d91924931f15ce681f1aa19f00a76155ab880f167a525285be02e6f16488c9
-
SSDEEP
98304:emhd1UryeXTnztENJYasV7wQqZUha5jtSyZIUbt:el31wJYas2QbaZtli4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2104 BAA8.tmp -
Executes dropped EXE 1 IoCs
pid Process 2104 BAA8.tmp -
Loads dropped DLL 2 IoCs
pid Process 1600 b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe 1600 b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2104 1600 b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe 30 PID 1600 wrote to memory of 2104 1600 b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe 30 PID 1600 wrote to memory of 2104 1600 b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe 30 PID 1600 wrote to memory of 2104 1600 b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe"C:\Users\Admin\AppData\Local\Temp\b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\BAA8.tmp"C:\Users\Admin\AppData\Local\Temp\BAA8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\b78ede01b581fa24b2c423069f3550beef40d441f8f3c0eae5d7880dbf0cc7d2N.exe 2249E22C25C57A140681D25D5272C7BA8DC62398F7A19A79FAD6056AD00497155A9D31183432823C2134B7FAEC08B3B0A74B372449FAF63FB45163DC4843216B2⤵
- Deletes itself
- Executes dropped EXE
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD526d69da8d479fd626b791f9a086653e3
SHA1ce3e4ea3abbd2ca98c0452692c7dfcef280a04be
SHA256bdb199ec105ce5a99528841f63b5ec648a77f91aefe249908dd665e0111d7af9
SHA5128a6609766030e880647d3c1bbdfb95b68bbda427694f09bb9fa530c559d351c48676e4417ad087fdb17b280d58e32a235b2e04410c7fa4eed521750ed37df993