Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/12/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankası Swift Mesajı.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ziraat Bankası Swift Mesajı.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
aqfvej.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
aqfvej.exe
Resource
win10v2004-20241007-en
General
-
Target
aqfvej.exe
-
Size
3KB
-
MD5
8762d96314aa376a765ea0ab07cb9637
-
SHA1
8e91d715bc8a617d2b2fe81dc0b6ffce1e3bafb5
-
SHA256
428ffb3962cd0c5758cf842792b131bcecb57a8014b42af2820395277b6a5574
-
SHA512
a366b2d2506852eb589aa2a1a3360413d48d6b081a23e131f4c6c12f9b65afa0db87d3d533da6d299c5a6f8903a76be1bc59a7235088ebe7b257daef67866b94
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2856 2792 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aqfvej.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2856 2792 aqfvej.exe 28 PID 2792 wrote to memory of 2856 2792 aqfvej.exe 28 PID 2792 wrote to memory of 2856 2792 aqfvej.exe 28 PID 2792 wrote to memory of 2856 2792 aqfvej.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aqfvej.exe"C:\Users\Admin\AppData\Local\Temp\aqfvej.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 1682⤵
- Program crash
PID:2856
-