Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 11:49

General

  • Target

    DDLC_russian_patch_3.2.exe

  • Size

    14.2MB

  • MD5

    bc7900b11ee151ebe0933a8207e681bd

  • SHA1

    edbd986032c3bb78b780aa8148cb2edf41b013c5

  • SHA256

    8a30778288d5c28cfcfdc8811153b9ef192da7e65f6614432d37e1898cd8b7a3

  • SHA512

    8f43f3047bf7c75cb2d5886e0f12ce25fd6535b701a9176614e0bc91c8e76448558d1cff01cd85329d8998a92b12fdd69d4bbe6e4345fea04009a2275225ad87

  • SSDEEP

    393216:cSkBm0j0rABzrVuIn/9lexAZjUY6kQZKptwk8tg/:cJBYIn/9lATY6lZfO

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DDLC_russian_patch_3.2.exe
    "C:\Users\Admin\AppData\Local\Temp\DDLC_russian_patch_3.2.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso37C.tmp\ioSpecial.ini

    Filesize

    693B

    MD5

    6105e2e486c20e609c1b1e4e4612c450

    SHA1

    74c186ba5e7c02bc5ee3aba8d275a52d3b22dc7d

    SHA256

    0c7b3de9e87f164fe316f00eb391155ec937340876fc4c98d27fb8b31bd13efc

    SHA512

    8d29445b926b78b0ab2ebe592df12ca586117f51ffa5d26f28afb5acdab7f4baf847b5054a3d3a650c6ffda98166aac936370428b9a1a0ba21173179fab71c64

  • C:\Users\Admin\AppData\Local\Temp\nso37C.tmp\ioSpecial.ini

    Filesize

    732B

    MD5

    23ac5ef6eaca35f48b663b892f672263

    SHA1

    8cf47c3d673c04fb52bf0044f7eee56845f2894b

    SHA256

    f673eefa4d5bf40dca11c1797141a3e0d5b1f4439b4e554b4302852f85d6ead3

    SHA512

    28d2e4f09f744680adc66c706b70f462ac0834f4f0cc19d8f75dce8df9b6c1702f4b4554313c7491fcd8e1ee489ff2826e0fbe88ea7498bdf6b23f1cc833a51f

  • \Users\Admin\AppData\Local\Temp\nso37C.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    20f3184efe7edddfef3325efc25d12a5

    SHA1

    8db4c500d73f9525a7e9834df6caea2e70189939

    SHA256

    0e014352b64abc431d97460d79757cbafbf6ba997c08b608c294e1f582af269a

    SHA512

    433188957a4603c9c61ec698a720021aacf61f46ccc32d5a11bcb6f2d0b1f01e5680635707d8a0ec7a9ef2aa2a85d6dec07ded452e4cb9e280062c0bed555c1a