Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/01/2025, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe
Resource
win10v2004-20241007-en
General
-
Target
6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe
-
Size
225KB
-
MD5
a9a3a5adbb8e9455108bbb186da043fd
-
SHA1
779f0938ffa05c7d2277f55cf695349e27284934
-
SHA256
6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d
-
SHA512
0c4e0161f7a9f7ac48b76e5450bd332086ea8de3da559b4592eb9c3696bda94ee4debbde5f50686aec9c65fa2c929891d04b0a00667a416b55db40fdf49376f5
-
SSDEEP
6144:EA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:EATuTAnKGwUAW3ycQqgX
Malware Config
Signatures
-
Tinba family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\35A6890C = "C:\\Users\\Admin\\AppData\\Roaming\\35A6890C\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe 2884 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2884 1176 6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe 29 PID 1176 wrote to memory of 2884 1176 6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe 29 PID 1176 wrote to memory of 2884 1176 6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe 29 PID 1176 wrote to memory of 2884 1176 6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe 29 PID 1176 wrote to memory of 2884 1176 6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe 29 PID 2884 wrote to memory of 1364 2884 winver.exe 20 PID 2884 wrote to memory of 1212 2884 winver.exe 18 PID 2884 wrote to memory of 1300 2884 winver.exe 19 PID 2884 wrote to memory of 1364 2884 winver.exe 20 PID 2884 wrote to memory of 1124 2884 winver.exe 22 PID 2884 wrote to memory of 1176 2884 winver.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1212
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1300
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe"C:\Users\Admin\AppData\Local\Temp\6d59d844329dba82ae8d3e7ff2d6d299d1f7751a2ff5e3a598698102b02a301d.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2884
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1124