Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe
Resource
win10v2004-20241007-en
General
-
Target
937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe
-
Size
10.3MB
-
MD5
47df77558743ef4aeeeb1767d4f9fc58
-
SHA1
c519a31aec3c5436e1e2a3cbba15fd836e8bfcf1
-
SHA256
937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255
-
SHA512
c0ac8a3840a5951f6ec6ee727cae44628625cb4d275dea8919f1aa4d547ac3880719341940c2a33537c45956ee08a7ea71929c467dfaa443b84c4ea293bcf490
-
SSDEEP
196608:dXHSVf+6b9oDdh0qTRxa8z1sULDSe9a+5crvT9YqS4lU4I4:dXHuf+6poDjBTRxa8psYSUa+arvSP0z
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2064 937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe 2064 937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2064 937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe"C:\Users\Admin\AppData\Local\Temp\937c6d89cc477738beb206fde3ecb125d11a1b494bec547a993647a28adca255.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5f4b10e2a3562393827383d4c4d50e2eb
SHA1c2facc61b751a37b5a0ead77cd40f66d3df340a8
SHA25615fb38a284ae32c86c6bd1615bd75df25b1d55808a4b19abec41a03cec65322d
SHA512e7e97efff386efce78b8bdf4063447fb5eaa9aa46d47d1acd447eeadab68a853d17e8f5b383e8677c9a728a058ae0f3fd44cd8f006ae4092a692c04c2fa2f890
-
Filesize
38B
MD57142b6e112bf0406c6dc2a68aa6005b5
SHA1f802fc95b613485882d153afd625b93a75fb5b42
SHA256fa8b12574db18bd4c942629e8af78e76c660b21d6d202177a45858bfc48ece0f
SHA512a5ae9cb1ffe1521c67a98348f9884713c3e2736ca52c1133309414cd9c0149891fd789efe30da66cddd7f91e4896d0fbf09233edb8fe3fc4a69abd4422685789