Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/10/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe
Resource
win7-20240903-en
General
-
Target
a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe
-
Size
89KB
-
MD5
89cabdf181ab420194557fafe276e480
-
SHA1
4ac6d8510f389cc7c9bee9a588183b6180042610
-
SHA256
a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45
-
SHA512
fabf69000eeb7f34cae941a7a3f467042d7c89cb6aa6b8a03c296d14518c1a7645d5e8f3165371264edc6fe0ab6eba94c9d0c6c6d82f7ce8d8ef37d6ebda768d
-
SSDEEP
1536:Ywhq8V9IpPf2lgiIJ4pivJnuNVueC39GdBR3Mz:YqV9MziU4piRun7C3CP3Mz
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.209
112.175.88.207
Signatures
-
Deletes itself 1 IoCs
pid Process 1668 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1528 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe 28 PID 1364 wrote to memory of 1528 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe 28 PID 1364 wrote to memory of 1528 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe 28 PID 1364 wrote to memory of 1528 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe 28 PID 1364 wrote to memory of 1668 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe 29 PID 1364 wrote to memory of 1668 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe 29 PID 1364 wrote to memory of 1668 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe 29 PID 1364 wrote to memory of 1668 1364 a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe"C:\Users\Admin\AppData\Local\Temp\a0a7adf664292ada80f2729dc4eface86383bef0519b696f6f1c1b972ab94b45N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD502167b944a214fee3d34f9a7e356dc6a
SHA1ca5b3f38a7151268726401593eb35f9b67bdde97
SHA25677fcdadc9ba56daa81edb3f0ef876e38a8c7de56187c28c7d02992cd9e0a243d
SHA512c8976c66724d737105a66699673052d7bc7f1e1941c91e03f97452aaba714d35b1d55434e950b00c58626b8bcf16186a731cccc503b7ba08f080ead3eaca5817
-
Filesize
340B
MD5f830df17d408f8529bd306fecae33d8d
SHA1f0896584e8d3f1d2cbea67e6a4e9246177a4d20d
SHA25635a91b5ae477432f6165ad85cfaa9984ffa75da0e1da9ab70cfa73b6a8ff9017
SHA512e623facbdbf14fdc57f17881dc85cd9f183e80627478f381034c149e6005fd1e7b4b6155cb401db85b2ffa89ca230a59c76762b5618581ce04d1aba13c4826db
-
Filesize
89KB
MD5802f633eb6607a3393f0a45adde1a516
SHA1a357e43e4bb26e4188a14f6143c94172a5f646db
SHA256a1e9ac61d139008bfdac212d98d5b31acb36475e6df75405d1fbbd17086c40c6
SHA51242451c047c7705a944e61979688f6ba08c07bd6e02fa11260f78f492ec5cfc055878d20d522a59f7334bd0a3a37404ff3713f2b468917091630495aa95f98337