Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe
Resource
win7-20240903-en
General
-
Target
3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe
-
Size
116KB
-
MD5
edcd41158c2aa45ceb27f4ae2133efe0
-
SHA1
3668b96f737d8d4236bd90235b1618db695c5db2
-
SHA256
3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74ab
-
SHA512
5dfd9a68d52402f9e020b6948fa1985ab20baf9b17cc55b69940fd74dc41c09c82a6b01c8e6bfcfd29062575e67cd01b9ef0bad7ee66dca71db483ccc136539c
-
SSDEEP
3072:LoMRmT05NCp/yTeOXIahuID203N7X9yV9GboM9:LoMRmT050/qeqJuI605NyV0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2848 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 1784 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1784 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 2848 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1868 wrote to memory of 1784 1868 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 30 PID 1784 wrote to memory of 2848 1784 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 31 PID 1784 wrote to memory of 2848 1784 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 31 PID 1784 wrote to memory of 2848 1784 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 31 PID 1784 wrote to memory of 2848 1784 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 31 PID 2848 wrote to memory of 2536 2848 explorer.exe 32 PID 2848 wrote to memory of 2536 2848 explorer.exe 32 PID 2848 wrote to memory of 2536 2848 explorer.exe 32 PID 2848 wrote to memory of 2536 2848 explorer.exe 32 PID 2848 wrote to memory of 2228 2848 explorer.exe 33 PID 2848 wrote to memory of 2228 2848 explorer.exe 33 PID 2848 wrote to memory of 2228 2848 explorer.exe 33 PID 2848 wrote to memory of 2228 2848 explorer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe"C:\Users\Admin\AppData\Local\Temp\3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exeC:\Users\Admin\AppData\Local\Temp\3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %14⤵PID:2536
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
-