Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 10:20 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe
Resource
win10v2004-20241007-en
General
-
Target
d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe
-
Size
1.1MB
-
MD5
fdbaef78bebf2082aa4918d06a3bab10
-
SHA1
0796969001f4ade47d2786046ee2401a582e3797
-
SHA256
d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346de
-
SHA512
f59228479befa8b23771ab9fb522a5e2d3ba0a5f9ee4c1621a9d5720a5ab41b1c4b88db47093646cbf572e214e8e742bd1bf2997259ff9ae32024747d11be743
-
SSDEEP
24576:JQ1OIyYqCfVk4Ym/jTnGDcZELIveNNvVohH2LUpDW9Tgn:JQ1Q6y4YmrVeNWrDW9En
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe -
Suspicious behavior: MapViewOfSection 11 IoCs
pid Process 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1092 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 19 PID 2132 wrote to memory of 1160 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 20 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe"C:\Users\Admin\AppData\Local\Temp\d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2132
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2572
Network
-
Remote address:8.8.8.8:53Requesthi.baidu.comIN AResponsehi.baidu.comIN CNAMEim.n.shifen.comim.n.shifen.comIN CNAMEin.m.wshifen.comin.m.wshifen.comIN A104.193.88.126in.m.wshifen.comIN A104.193.88.125
-
GEThttp://hi.baidu.com/aegifjftrggluze/item/be185dc989cae4f4984aa0dfd62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exeRemote address:104.193.88.126:80RequestGET /aegifjftrggluze/item/be185dc989cae4f4984aa0df HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0
Host: hi.baidu.com
Cache-Control: no-cache
ResponseHTTP/1.1 302 Found
Content-Type: text/html; charset=utf-8
Date: Thu, 10 Oct 2024 10:20:24 GMT
Location: https://infoflow.baidu.com
-
Remote address:8.8.8.8:53Requestinfoflow.baidu.comIN AResponseinfoflow.baidu.comIN CNAMEim.n.shifen.comim.n.shifen.comIN CNAMEin.m.wshifen.comin.m.wshifen.comIN A104.193.88.126in.m.wshifen.comIN A104.193.88.125
-
GEThttps://infoflow.baidu.com/d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exeRemote address:104.193.88.126:443RequestGET / HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0
Host: infoflow.baidu.com
Cache-Control: no-cache
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Connection: keep-alive
Content-Length: 4546
Content-Security-Policy: base-uri 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline' 'report-sample' blob: baidu: *.infoflow.baidu.com *.im.baidu.com zhiqiu.baidu.com passport.baidu.com passport.bdimg.com cdnjs.cloudflare.com uuap.baidu.com uuap.baidu-int.com *.weiyun.baidu.com wappass.baidu.com hi-static.bj.bcebos.com ops-wps.cdn.bcebos.com wps-office-static.cdn.bcebos.com code.bdstatic.com knowledge-infoflow.cdn.bcebos.com knowledge-infoflow.bj.bcebos.com workflow.cdn.bcebos.com hi-static.cdn.bcebos.com ufosdk.baidu.com office-online.baidu.com office-online-gray.baidu.com hidoc-office-online-gray.weiyun.baidu.com uflow.baidu-int.com uflow-gray.baidu-int.com jsdk.baidu.com libs.baidu.com fe.bdimg.com hmcdn.baidu.com hm.baidu.com himonitor.baidu.com cdn.bootcss.com:* qapm.baidu.com *.qatest.baidu.com *.cdn.bcebos.com *.bcebos.com; object-src 'self'; frame-src 'self' baidu: *.infoflow.baidu.com *.im.baidu.com *.neisou.baidu-int.com passport.baidu.com uuap.baidu.com uuap.baidu-int.com hmcdn.baidu.com hm.baidu.com office-service.baidu.com office-service-gray.baidu.com office-gray.weiyun.baidu.com http://office-service-gray.baidu.com https://office-service-gray.baidu.com http://office-gray.weiyun.baidu.com https://office-gray.weiyun.baidu.com ufosdk.baidu.com http://office-online.baidu.com https://office-online.baidu.com office-online-gray.baidu.com hidoc-office-online-gray.weiyun.baidu.com learn.baidu.com wvjbscheme: webviewprogressproxy: data:; report-uri https://log.im.baidu.com/gc/csp-report https://report-uri.baidu.com/report?app=hi
Content-Type: text/html; charset=utf-8
Date: Thu, 10 Oct 2024 10:20:26 GMT
Env: online
Etag: "661924a9-11c2"
Last-Modified: Fri, 12 Apr 2024 12:10:17 GMT
Server: openresty
Vary: Accept-Encoding
X-Envoy-Upstream-Service-Time: 1
X-Logid: 499526619534187520
X-Xss-Protection: 1;mode=block
-
Remote address:8.8.8.8:53Requestcrl.microsoft.comIN AResponsecrl.microsoft.comIN CNAMEcrl.www.ms.akadns.netcrl.www.ms.akadns.netIN CNAMEa1363.dscg.akamai.neta1363.dscg.akamai.netIN A2.19.117.18a1363.dscg.akamai.netIN A2.19.117.22
-
Remote address:2.19.117.18:80RequestGET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 11 Jul 2024 01:45:51 GMT
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: 8M9bF5Tsp81z+cAg2quO8g==
Last-Modified: Thu, 26 Sep 2024 02:21:11 GMT
ETag: 0x8DCDDD1E3AF2C76
Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id: b28c4ea1-d01e-0016-0ebc-0fa13d000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Thu, 10 Oct 2024 10:20:57 GMT
Connection: keep-alive
-
104.193.88.126:80http://hi.baidu.com/aegifjftrggluze/item/be185dc989cae4f4984aa0dfhttpd62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe687 B 550 B 9 8
HTTP Request
GET http://hi.baidu.com/aegifjftrggluze/item/be185dc989cae4f4984aa0dfHTTP Response
302 -
104.193.88.126:443https://infoflow.baidu.com/tls, httpd62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe1.4kB 13.0kB 17 22
HTTP Request
GET https://infoflow.baidu.com/HTTP Response
200 -
399 B 1.7kB 4 4
HTTP Request
GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crlHTTP Response
200
-
58 B 143 B 1 1
DNS Request
hi.baidu.com
DNS Response
104.193.88.126104.193.88.125
-
8.8.8.8:53infoflow.baidu.comdnsd62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe64 B 149 B 1 1
DNS Request
infoflow.baidu.com
DNS Response
104.193.88.126104.193.88.125
-
63 B 162 B 1 1
DNS Request
crl.microsoft.com
DNS Response
2.19.117.182.19.117.22