Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
abd5e404bced58d95642413da7d50914b3154c173a81554bd963d7fb0c22f588N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abd5e404bced58d95642413da7d50914b3154c173a81554bd963d7fb0c22f588N.exe
Resource
win10v2004-20241007-en
General
-
Target
abd5e404bced58d95642413da7d50914b3154c173a81554bd963d7fb0c22f588N.exe
-
Size
157KB
-
MD5
17e59cf48db133aff300c527db7aceb0
-
SHA1
135fbb7d44a9ea8f8bd2db5aeb07fbc5a78fbfb9
-
SHA256
abd5e404bced58d95642413da7d50914b3154c173a81554bd963d7fb0c22f588
-
SHA512
de240fb1516b431a22d48ba092a95aa08878b97ea8ec8b9c70186062e559648584f308fce6496d6dd4e7f56cec3707683c83a54c2db21155c5aa96f602152378
-
SSDEEP
3072:phj0Hzpm9Tcek9R7dE62yiV5AO/aWeVomBhGYtr:30TpeceRF7aI+b
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2496 vuhvodg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zcwirze.dll vuhvodg.exe File created C:\PROGRA~3\Mozilla\vuhvodg.exe abd5e404bced58d95642413da7d50914b3154c173a81554bd963d7fb0c22f588N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abd5e404bced58d95642413da7d50914b3154c173a81554bd963d7fb0c22f588N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vuhvodg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2496 2616 taskeng.exe 32 PID 2616 wrote to memory of 2496 2616 taskeng.exe 32 PID 2616 wrote to memory of 2496 2616 taskeng.exe 32 PID 2616 wrote to memory of 2496 2616 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\abd5e404bced58d95642413da7d50914b3154c173a81554bd963d7fb0c22f588N.exe"C:\Users\Admin\AppData\Local\Temp\abd5e404bced58d95642413da7d50914b3154c173a81554bd963d7fb0c22f588N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3048
-
C:\Windows\system32\taskeng.exetaskeng.exe {07309B03-548E-4BB8-9724-5DD9A6CC86AD} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\PROGRA~3\Mozilla\vuhvodg.exeC:\PROGRA~3\Mozilla\vuhvodg.exe -nwlnhvb2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD55049ef4267b3f9be78a774a56404ac09
SHA148d2fa1653ce0f86495e3b18eca1c205797daec4
SHA256a335f6e3240f2a134ab2fed032a9561bd746662a09e33a919c470370afee5b42
SHA5121c1d51fa283b823032ab22d0487d431bc4edafb7af0813d28ea28fc2e3cda00ee6231e4b024633e0952e885f4e8258023708383453bee891969afefd692190c3