Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe
Resource
win10v2004-20241007-en
General
-
Target
01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe
-
Size
2.4MB
-
MD5
33c42601c5cc7ff28159c7c024dc60e6
-
SHA1
85fae67ade783ecae31a392235599b4ec7ab5b9b
-
SHA256
01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c
-
SHA512
4df9c9c508f59c94ed949eed319a9d9957de3707d82da18e85a9710470be312a69eb70567f582e75a9d94b28066be1640e01bd7ac68565eda6d02e718019265c
-
SSDEEP
49152:jKv5tHSZPcn/XLmFCoxnximwEsLknp7YpSa8+0y:GvfSZPcnTmvNwEWsp7r80
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3468 2004 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3272 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3380 powershell.exe 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3248 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 30 PID 2004 wrote to memory of 3248 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 30 PID 2004 wrote to memory of 3248 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 30 PID 2004 wrote to memory of 3248 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 30 PID 3248 wrote to memory of 3272 3248 cmd.exe 32 PID 3248 wrote to memory of 3272 3248 cmd.exe 32 PID 3248 wrote to memory of 3272 3248 cmd.exe 32 PID 3248 wrote to memory of 3272 3248 cmd.exe 32 PID 2004 wrote to memory of 3380 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 33 PID 2004 wrote to memory of 3380 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 33 PID 2004 wrote to memory of 3380 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 33 PID 2004 wrote to memory of 3380 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 33 PID 2004 wrote to memory of 3468 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 35 PID 2004 wrote to memory of 3468 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 35 PID 2004 wrote to memory of 3468 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 35 PID 2004 wrote to memory of 3468 2004 01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe"C:\Users\Admin\AppData\Local\Temp\01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3272
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 7002⤵
- Program crash
PID:3468
-