Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/11/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe
Resource
win10v2004-20241007-en
General
-
Target
ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe
-
Size
610KB
-
MD5
9f19bdef237bc710e91c742acb2b6617
-
SHA1
05e62730d213452a22591271a34dc87d7f5cb393
-
SHA256
ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2
-
SHA512
5f972738c4b7d1e646cce3735a65e6483d982c835cd265f44d29a3ccc739a8e6fafd48b2a2151807e5a17a3e1d12ecf5e064116de219b80ab3f8749c1458ae51
-
SSDEEP
12288:FATuTAnKGwUAW3ycQqgYo3CyWoKEY3ZQi7gfqOuuh+c:vT+KjUdQqboyyWoK1NGqzuhb
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\43A976BD = "C:\\Users\\Admin\\AppData\\Roaming\\43A976BD\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe 3008 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3008 2604 ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe 30 PID 2604 wrote to memory of 3008 2604 ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe 30 PID 2604 wrote to memory of 3008 2604 ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe 30 PID 2604 wrote to memory of 3008 2604 ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe 30 PID 2604 wrote to memory of 3008 2604 ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe 30 PID 3008 wrote to memory of 1204 3008 winver.exe 21 PID 3008 wrote to memory of 1116 3008 winver.exe 19 PID 3008 wrote to memory of 1164 3008 winver.exe 20 PID 3008 wrote to memory of 1204 3008 winver.exe 21 PID 3008 wrote to memory of 324 3008 winver.exe 25 PID 3008 wrote to memory of 2604 3008 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe"C:\Users\Admin\AppData\Local\Temp\ad984b54f9ed96c910ec039efeaa6eb9d80f84b756756317fa49c3c81f444db2.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3008
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:324