Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06/12/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe
Resource
win10v2004-20241007-en
General
-
Target
40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe
-
Size
59KB
-
MD5
1e5cdf8ef9ff028e73bd64d01a112c60
-
SHA1
07a9abc5bdcf88e10f8d54db6076a77cb862d96a
-
SHA256
40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631
-
SHA512
ceacfed9a4db37f26046a607311ee7a9012871239f9fe4b5d2d06d020aaa4a7b687d9e2d47b35ef3ef549de8887d07f36b73a89022abfa7071bb572b0bbf76c5
-
SSDEEP
768:K+6p+OMlgGMCWhfDzU7f7JDgiFP7xI57+sByZ+XsfXpwtGc9J1:K+mFM2HXKZgiFP7xIksu+XM5O9J1
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\F300167B = "C:\\Users\\Admin\\AppData\\Roaming\\F300167B\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe 2488 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2488 1372 40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe 31 PID 1372 wrote to memory of 2488 1372 40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe 31 PID 1372 wrote to memory of 2488 1372 40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe 31 PID 1372 wrote to memory of 2488 1372 40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe 31 PID 1372 wrote to memory of 2488 1372 40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe 31 PID 2488 wrote to memory of 1176 2488 winver.exe 21 PID 2488 wrote to memory of 1072 2488 winver.exe 17 PID 2488 wrote to memory of 1092 2488 winver.exe 19 PID 2488 wrote to memory of 1176 2488 winver.exe 21 PID 2488 wrote to memory of 1824 2488 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1072
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1092
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe"C:\Users\Admin\AppData\Local\Temp\40a432671310be48078d8ef1708451b3d2a5436b2d5a419c8bdfa4c91c1c2631N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2488
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1824