Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe
Resource
win10v2004-20240802-en
General
-
Target
bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe
-
Size
11.0MB
-
MD5
d887950e7549d88a293ce3fc5e077737
-
SHA1
d2f78ee3c4948c364b09d06c8e03e58f3f20146d
-
SHA256
bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d
-
SHA512
628f5075ca9b501e502f0d26eae2c49c6e414d29d06074e0a8155109f252703f832b1ee16b5ffdeab0aadd937d5cfed3b5d25f3ac03614af536589d9020da478
-
SSDEEP
196608:5lAWWOUJYS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:56WtUJYRrDjtLKkOa8ps6puAktIz
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2960 bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe 2960 bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2960 bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe"C:\Users\Admin\AppData\Local\Temp\bf11029f54e690c1324467c544612ef0ebc519e67899657b70f104b38c0bb12d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ca3b0ebf63e194a13faabe4669b927e3
SHA13d455348b7f601805aa9a5ede48571890338d7c7
SHA25636c9b7ee52e323752b23327b9ad4fe07d0bf366a2f293f40431b76495bfef3d0
SHA5125eef4eb132765051dc07f322e619e91e5eeda5a7da942e303f2d77325f924217d5cae5e5d3db74427a53293a0e829b1489be7994e3bd40f3af1620a522b84eb1
-
Filesize
9KB
MD5b827b94487f34bcb43e66e3569aa0588
SHA1b15f1b8c8caea7bf502d9c7a512b0380b80af49a
SHA25619071bb9c75efbbfd17dce1f824b117bb03f6e4206e440d5c7a1f5e71fc3c6be
SHA5122f5e9f312f0900d3a97865942ddc080ca89b1382cbf7cc644f10e1cea4f1f0a79304325cbd25231a87cd37574f710e05e2c63212b7a456053aa2c8caef74d432
-
Filesize
38B
MD5a0e1ab15711f23026a076d6a4d7fb332
SHA1bebb345a476ffc6c3cd7bfefab45f4111d605486
SHA256b25a001d04eefd48b53df3d1cf037d0c9f623937dfe8343563906fa5c127901e
SHA5122242d054d42a48b8aa0e7e6672718897b90b7c0b99fd31f59fb8c4795c43a153cd8541a28ce240ffc4ae50ea5eb8e844beceaad266807c307e62a3cf909a19dd