Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/12/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe
Resource
win10v2004-20241007-en
General
-
Target
1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe
-
Size
225KB
-
MD5
6e15445fdf95bee026ee3e1ad97e3de0
-
SHA1
80585b0b24763038ae26a6d3870fdb05192a92b9
-
SHA256
1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbed
-
SHA512
188989584ebcfe9eef3ff07230a8452af4b543efab04cd26bea4f593ff0dc8d39654cee762a2747ea19d71929df1a7ce01e18b428adebef2aee975e53a7510c8
-
SSDEEP
6144:+A2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:+ATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\95642B66 = "C:\\Users\\Admin\\AppData\\Roaming\\95642B66\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe 2908 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2908 2120 1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe 31 PID 2120 wrote to memory of 2908 2120 1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe 31 PID 2120 wrote to memory of 2908 2120 1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe 31 PID 2120 wrote to memory of 2908 2120 1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe 31 PID 2120 wrote to memory of 2908 2120 1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe 31 PID 2908 wrote to memory of 1232 2908 winver.exe 21 PID 2908 wrote to memory of 1108 2908 winver.exe 19 PID 2908 wrote to memory of 1160 2908 winver.exe 20 PID 2908 wrote to memory of 1232 2908 winver.exe 21 PID 2908 wrote to memory of 1224 2908 winver.exe 23 PID 2908 wrote to memory of 2120 2908 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe"C:\Users\Admin\AppData\Local\Temp\1dfb125e812e6c3cbcd24d78c1da549c4af7220ab6dfc323a7c44149249cdbedN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2908
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1224