Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/10/2024, 08:58
Behavioral task
behavioral1
Sample
08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe
Resource
win7-20240903-en
General
-
Target
08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe
-
Size
4.2MB
-
MD5
f9382bd2cd2be490fb5e4f4d787961b0
-
SHA1
ff8de7f43e6379e6593816f760046bb43d3be208
-
SHA256
08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1
-
SHA512
71ee17ac85852bc611a5589312752f740bbd137771032f33c9abcb377a31bf63ac0b7242567145f2151e5a2eba5a8a847233f4b623ca6fba120565ca21bcc087
-
SSDEEP
98304:ns1FPQis1RGRsHau42c1joCjMPkNwk6alDAqD7z3ubh:KCP0+auq1jI86FA7yt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1712 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe -
Executes dropped EXE 1 IoCs
pid Process 1712 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe -
Loads dropped DLL 1 IoCs
pid Process 2528 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe -
resource yara_rule behavioral1/memory/2528-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a00000001225c-10.dat upx behavioral1/memory/1712-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2528 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2528 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe 1712 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1712 2528 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe 31 PID 2528 wrote to memory of 1712 2528 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe 31 PID 2528 wrote to memory of 1712 2528 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe 31 PID 2528 wrote to memory of 1712 2528 08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe"C:\Users\Admin\AppData\Local\Temp\08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exeC:\Users\Admin\AppData\Local\Temp\08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\08f4164435388d09b7c5c22630c0695aabc0ea166a6d8cef7120bab27ea467b1N.exe
Filesize4.2MB
MD59d7ab6b18df91b4f27c7c2dd3b7e3709
SHA1070bec03401de0eb053f4cec3164e49e2a22e6af
SHA256c4c6d7ea29c946884f21e2c75f559f143568cc8940f3ebdd719e22939c7ac14c
SHA512defc2953112f26f86a73bcceb633c50891de7ce151f7e46d373352c0178e1f968ec48d9c9bb1e2a179c9cccdb616e4b01439e47438f7a393a1eb77f34991796e