Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe
Resource
win10v2004-20241007-en
General
-
Target
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe
-
Size
19KB
-
MD5
d8bf1ef88a3bd758d7ae78f791b24b40
-
SHA1
303c9fd3ed61e3730e0eb065ad06e1f3c8ac2d69
-
SHA256
5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120
-
SHA512
50ef7ef38071ce6f1139fdef754c17b464733666a57bdec48233d182935561f60e9b758fb22f75ea6d840eb09a434e09529c0314c98e28f47c9b1da959f6e9e7
-
SSDEEP
384:qfRJYAySsaRbAEJb/0rZRwZBgs3CVyu850fEvkjzJYFK:qfRygBbJj0dRwzgvysfjEK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2124 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2124 2536 5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe 30 PID 2536 wrote to memory of 2124 2536 5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe 30 PID 2536 wrote to memory of 2124 2536 5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe 30 PID 2536 wrote to memory of 2124 2536 5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe"C:\Users\Admin\AppData\Local\Temp\5cb2bb07453fb618fd5754e2a40a84c651b6b37be16ec98c1212fbe747df8120N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD532a8e641dbd029170ebb3d415fc004ec
SHA1a059ddd96760e1ae9a2fca9edc33a910666b59eb
SHA256ed40a18b944b4f210b054423f2aadf7f2fc66028b05aff5794ea38dcd1a7953b
SHA512d7f68789692183158b2cc92df225fa96804ce00cd06071aedfcf7ee927c3191dcfcbf3b5e86bcaf6319e2621c31fe3c8ffcf42e2598d9114a70c62dfef438e01