Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe
Resource
win10v2004-20241007-en
General
-
Target
9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe
-
Size
72KB
-
MD5
92587576dadf91d8fb1b6b8c07fa3610
-
SHA1
3530bb99d170919dbc2051301546078f6a1188d9
-
SHA256
9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477
-
SHA512
5a4eff6066af13f3536ee0e62ce59b35d05b169997bfa08ba2fdb4ccdb489238d2225000782071cafb50d91d26781fd11c2e5350a7d1d1cc0d6714f6242a08ad
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZOj:DW60sllyWOtEvwDpjwF85M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1356 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1356 2532 9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe 30 PID 2532 wrote to memory of 1356 2532 9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe 30 PID 2532 wrote to memory of 1356 2532 9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe 30 PID 2532 wrote to memory of 1356 2532 9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe"C:\Users\Admin\AppData\Local\Temp\9221d77a3eb6f941bd17543f1deb15d8c5f1ad186e2972cf892e920790958477N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD570d33933ec78cf6c60acd937a7e564c4
SHA1b88f71fa03cbf7552c634ec0060df767700ec463
SHA25660a6e2bfe9320bddc82ce8f4f9ed4ea0fac9fe3375b175186ff2197e9a0e8d89
SHA5128d9d4c565b206b870ae86a40526bfadaf0d660bf0c24d25f9befaa2657713bf4a2ca66edb8f3b56e5722dfe14b5f8f9fe404c0922bb2fbc3c7da1d5b3becc69b