Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe
Resource
win7-20240708-en
General
-
Target
fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe
-
Size
255KB
-
MD5
dd9531041b5b8e3fbb63619d85a6ffd4
-
SHA1
cd584aca434d3128f3920f12fe84bee4b8747ac9
-
SHA256
fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f
-
SHA512
f6aa228cea97233435dca5f054739b3fb6302ac25e15093cc7aaf4ec954e8a961a3408907d94ac882d0fc1b127da1cb0ee63108d09585dbd355dd505e323d31d
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ4w:EeGUA5YZazpXUmZhPw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 596 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 1488 fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe 596 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1488 wrote to memory of 596 1488 fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe 31 PID 1488 wrote to memory of 596 1488 fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe 31 PID 1488 wrote to memory of 596 1488 fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe 31 PID 1488 wrote to memory of 596 1488 fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe 31 PID 1488 wrote to memory of 596 1488 fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe 31 PID 1488 wrote to memory of 596 1488 fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe 31 PID 1488 wrote to memory of 596 1488 fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe 31 PID 596 wrote to memory of 2744 596 a1punf5t2of.exe 32 PID 596 wrote to memory of 2744 596 a1punf5t2of.exe 32 PID 596 wrote to memory of 2744 596 a1punf5t2of.exe 32 PID 596 wrote to memory of 2744 596 a1punf5t2of.exe 32 PID 596 wrote to memory of 2744 596 a1punf5t2of.exe 32 PID 596 wrote to memory of 2744 596 a1punf5t2of.exe 32 PID 596 wrote to memory of 2744 596 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe"C:\Users\Admin\AppData\Local\Temp\fcfe240e19c1a0fb6ec1af532cb2cd2bb8946c22c8bc76f965f84ab70caa7c4f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD56f7074ffa28491ad5e14463df6e41699
SHA1c5cb7e60e7253d3c8a9e354e561799c78cc81eb7
SHA2568e9856a516a7cc408d3202bb2838cd5902c95638334bb3b782cbb8b5785bba68
SHA512ed734244d4f224c02fa464eb7f393cec4c2f8b956e32b7f7da4c9ca557a31fe6b96685b07987fc1055082fb4d881ad6d99ee98064479b0969b1158255fe075a6