Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/01/2025, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe
Resource
win7-20240903-en
General
-
Target
f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe
-
Size
1.1MB
-
MD5
d658dadccb4a21c0b50d0dc0406f9c3f
-
SHA1
eb50304a3fcc3664f7f7f598830eb379f347b793
-
SHA256
f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56
-
SHA512
73b4fae7dc1a8363a6a2eea1610d2a6655367dbac393e7e00acf6277773d561f76d4bc47824de3e588d5ec91566b35f0233d3f143f80bcf7dd9b57c2a54c86bd
-
SSDEEP
24576:QMjh7ExHIySDQwfx7FbD/KhlcBQgbLY1Yl05bmktUNudtJjdPrF:jmHZSDQyJP/+jgbLuYlab7SNudXjdTF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1868 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp -
Loads dropped DLL 10 IoCs
pid Process 3008 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 1868 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 1868 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 1868 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 2428 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 2860 regsvr32.exe 2872 regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2844 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1868 3008 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 30 PID 3008 wrote to memory of 1868 3008 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 30 PID 3008 wrote to memory of 1868 3008 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 30 PID 3008 wrote to memory of 1868 3008 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 30 PID 3008 wrote to memory of 1868 3008 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 30 PID 3008 wrote to memory of 1868 3008 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 30 PID 3008 wrote to memory of 1868 3008 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 30 PID 1868 wrote to memory of 2180 1868 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 31 PID 1868 wrote to memory of 2180 1868 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 31 PID 1868 wrote to memory of 2180 1868 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 31 PID 1868 wrote to memory of 2180 1868 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 31 PID 2180 wrote to memory of 2844 2180 cmd.exe 33 PID 2180 wrote to memory of 2844 2180 cmd.exe 33 PID 2180 wrote to memory of 2844 2180 cmd.exe 33 PID 2180 wrote to memory of 2844 2180 cmd.exe 33 PID 2180 wrote to memory of 2428 2180 cmd.exe 34 PID 2180 wrote to memory of 2428 2180 cmd.exe 34 PID 2180 wrote to memory of 2428 2180 cmd.exe 34 PID 2180 wrote to memory of 2428 2180 cmd.exe 34 PID 2180 wrote to memory of 2428 2180 cmd.exe 34 PID 2180 wrote to memory of 2428 2180 cmd.exe 34 PID 2180 wrote to memory of 2428 2180 cmd.exe 34 PID 2428 wrote to memory of 2732 2428 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 35 PID 2428 wrote to memory of 2732 2428 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 35 PID 2428 wrote to memory of 2732 2428 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 35 PID 2428 wrote to memory of 2732 2428 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 35 PID 2428 wrote to memory of 2732 2428 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 35 PID 2428 wrote to memory of 2732 2428 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 35 PID 2428 wrote to memory of 2732 2428 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe 35 PID 2732 wrote to memory of 2860 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 36 PID 2732 wrote to memory of 2860 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 36 PID 2732 wrote to memory of 2860 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 36 PID 2732 wrote to memory of 2860 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 36 PID 2732 wrote to memory of 2860 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 36 PID 2732 wrote to memory of 2860 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 36 PID 2732 wrote to memory of 2860 2732 f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp 36 PID 2860 wrote to memory of 2872 2860 regsvr32.exe 37 PID 2860 wrote to memory of 2872 2860 regsvr32.exe 37 PID 2860 wrote to memory of 2872 2860 regsvr32.exe 37 PID 2860 wrote to memory of 2872 2860 regsvr32.exe 37 PID 2860 wrote to memory of 2872 2860 regsvr32.exe 37 PID 2860 wrote to memory of 2872 2860 regsvr32.exe 37 PID 2860 wrote to memory of 2872 2860 regsvr32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe"C:\Users\Admin\AppData\Local\Temp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\is-762TN.tmp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp"C:\Users\Admin\AppData\Local\Temp\is-762TN.tmp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp" /SL5="$30144,770488,161792,C:\Users\Admin\AppData\Local\Temp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe" /VERYSILENT /SUPPRESSMSGBOXES3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\timeout.exetimeout /T 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe"C:\Users\Admin\AppData\Local\Temp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe" /VERYSILENT /SUPPRESSMSGBOXES4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\is-NSFCJ.tmp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp"C:\Users\Admin\AppData\Local\Temp\is-NSFCJ.tmp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp" /SL5="$501BE,770488,161792,C:\Users\Admin\AppData\Local\Temp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:SYNC "C:\Users\Admin\AppData\Roaming\\2crypt32.drv"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\regsvr32.exe/s /i:SYNC "C:\Users\Admin\AppData\Roaming\\2crypt32.drv"7⤵
- Loads dropped DLL
PID:2872
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5221be8861ed61d34671e8960677f4bcd
SHA1cc56c6ed1452545ded9330996e7458b0aedfb2b5
SHA256a4766645820a4f2bb25ef320eafabed7da544be1403eb9290227e751123cb14f
SHA51245c7a7fe74e868b6689b6b1f1a750f2ddabdd1bff37637fcc6aac848a35d01820e820c4271e6f98fcb0a7096f27cadb020cb2ad72c1842add626986d6cc08fda
-
\Users\Admin\AppData\Local\Temp\is-762TN.tmp\f725bf614120e26b774341f54d73210aea60205c2723e155cb6fd09fa4411b56.tmp
Filesize1.1MB
MD5bcc236a3921e1388596a42b05686ff5e
SHA143bffbbac6a1bf5f1fa21e971e06e6f1d0af9263
SHA25643a656bcd060e8a36502ca2deb878d56a99078f13d3e57dcd73a87128588c9e9
SHA512e3baaf1a8f4eb0e1ab57a1fb35bc7ded476606b65fafb09835d34705d8c661819c3cfa0ecc43c5a0d0085fd570df581438de27944e054e12c09a6933bbf5ce04
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3