Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
513f8bb1af7...be.exe
windows7-x64
1049b84085b7...c6.exe
windows7-x64
10639a86559b...3d.exe
windows7-x64
10Счет �...15.scr
windows7-x64
3Счет �...08.scr
windows7-x64
3inquiry.scr
windows7-x64
9c0cf40b883...3a.exe
windows7-x64
8e49778d20a...73.exe
windows7-x64
8ПРЕТЕ...Я.scr
windows7-x64
5карто...я.scr
windows7-x64
5Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/11/2024, 20:50
Behavioral task
behavioral1
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Счет и накладная/Накладная для 1736 от 26.08.2015.scr
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
Счет и накладная/Счет на оплату от 26-08.scr
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
inquiry.scr
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
General
-
Target
ПРЕТЕНЗИЯ.scr
-
Size
231KB
-
MD5
6c01e0f297debe4606cf2cab510c38ab
-
SHA1
cea2a8e2f75a027fbbcada3aae952247009cdfbc
-
SHA256
d228eaf1e691f993be276129421583737f85185eb8f04695db7707dc3ac175fb
-
SHA512
c56ec26ccde738aef65d35e8adbb5f871194716f23b90532d9ec397f2ea2788b8b186eb2787e166eb2e898a579081525a0ea806dbb1cb0b3ee7e49af7ad97b50
-
SSDEEP
6144:THJih6+NSgZ7OT1Oq1qbS1x9pAxEP3vgBHK:TpWRZ7OJODuq6/
Malware Config
Signatures
-
resource yara_rule behavioral9/memory/2112-0-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral9/memory/2112-2-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2692 2112 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ПРЕТЕНЗИЯ.scr -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2112 ПРЕТЕНЗИЯ.scr -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2692 2112 ПРЕТЕНЗИЯ.scr 30 PID 2112 wrote to memory of 2692 2112 ПРЕТЕНЗИЯ.scr 30 PID 2112 wrote to memory of 2692 2112 ПРЕТЕНЗИЯ.scr 30 PID 2112 wrote to memory of 2692 2112 ПРЕТЕНЗИЯ.scr 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ПРЕТЕНЗИЯ.scr"C:\Users\Admin\AppData\Local\Temp\ПРЕТЕНЗИЯ.scr" /S1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 1002⤵
- Program crash
PID:2692
-