Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/10/2024, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe
Resource
win10v2004-20241007-en
General
-
Target
ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe
-
Size
225KB
-
MD5
dc5031389986045e9ea914bd87d83290
-
SHA1
186eab6cc83ad8c5d712de58591723abd8b66a58
-
SHA256
ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0
-
SHA512
01f44cc99b68b561c953aef9c06f1099f8e1f92fb4fa24484bba662ff5fd07935df1e59968cb45d47ea87197991ac41ffa655814754e7f1f49d3809fe1b0ddaf
-
SSDEEP
6144:4A2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:4ATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\92AABF35 = "C:\\Users\\Admin\\AppData\\Roaming\\92AABF35\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe 3004 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3004 winver.exe 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3004 2868 ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe 30 PID 2868 wrote to memory of 3004 2868 ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe 30 PID 2868 wrote to memory of 3004 2868 ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe 30 PID 2868 wrote to memory of 3004 2868 ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe 30 PID 2868 wrote to memory of 3004 2868 ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe 30 PID 3004 wrote to memory of 1192 3004 winver.exe 21 PID 3004 wrote to memory of 1112 3004 winver.exe 19 PID 3004 wrote to memory of 1164 3004 winver.exe 20 PID 3004 wrote to memory of 1192 3004 winver.exe 21 PID 3004 wrote to memory of 1188 3004 winver.exe 23 PID 3004 wrote to memory of 2868 3004 winver.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe"C:\Users\Admin\AppData\Local\Temp\ef5cea005214617bbf95c3794aac2e1f76f4fc2eaff175ebf75f6ea34bfb04e0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3004
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1188