Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe
Resource
win10v2004-20240802-en
General
-
Target
60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe
-
Size
10.0MB
-
MD5
694e96a74fd5ef6ead4abb5d40acd3a5
-
SHA1
4de95af219037b7badf512427f8477edd646344b
-
SHA256
60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e
-
SHA512
2ce1e8f6e8549e3bda4c575fe0394c6bcd9bf18a97774b48d12473a9bc270d4dea180320f1ff2d9287476fbbf86ee1201611a4b187ee340673c03dee10192e03
-
SSDEEP
196608:4eoS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:4eoRrDjtLKkOa8ps6puAktIz
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2848 60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe 2848 60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2848 60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe"C:\Users\Admin\AppData\Local\Temp\60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
7KB
MD54080981e4bb254e6d2dd746451f22863
SHA15d16ff6d920cac2fd426e49add4fcdd57b0ba1c7
SHA256ff94986319be81790ff4165fcd74cfb8ef4ddfd765c2e5040a2a3457c2c39b87
SHA51290b71f4b4b9da78c00854379f8068ea1f2eb24a005ef9377a38434f319acfc03de1db06dfa0b456643ae68f4fa1f56dbae918e6112661030498c575a80a4dd17
-
Filesize
2KB
MD519e047dce0c61b67cf1713372cbc2221
SHA16eece2b1d6558a0e2c2f984fef11735d1bd7db0d
SHA25608378202a8ab6dc3d95e5d435d4792137b4f54b78b37b1a1510e68985212784b
SHA5125400c3b87c0249bed45cda623ce8e18cc324cf7d9cee4c37bf13e552b52f2d27a110a1e897788c22d7bea6d19173be0e86867cbee1bb5c0810f23f38472e0809
-
Filesize
38B
MD596fd9c129986ee1cc0e6df4376ecf1b0
SHA156ebd6cdb125a78b8b1ade174d5f55b4f71c7ac0
SHA256da7f025b8b622e61497cbc6e7e51f8861c097ddff8ddc1b3bcc18dbfbc4ad7fb
SHA512cd2ec359fec6ed1dc36be6e0ef0b151f90039e4d986fe30f259bdaa86683b36d3a222bb7b02375c009724770318e41c86d7a86e38e7d0296d529777a65353969