Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1066db285985...c4.exe
windows7-x64
1066db285985...c4.exe
windows10-2004-x64
1066db285985...c4.exe
android-10-x64
66db285985...c4.exe
android-13-x64
66db285985...c4.exe
macos-10.15-amd64
66db285985...c4.exe
ubuntu-18.04-amd64
66db285985...c4.exe
debian-9-armhf
66db285985...c4.exe
debian-9-mips
66db285985...c4.exe
debian-9-mipsel
out.exe
windows7-x64
3out.exe
windows10-2004-x64
3out.exe
android-10-x64
out.exe
android-13-x64
out.exe
macos-10.15-amd64
out.exe
ubuntu-18.04-amd64
out.exe
debian-9-armhf
out.exe
debian-9-mips
out.exe
debian-9-mipsel
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/02/2025, 07:20
Behavioral task
behavioral1
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral7
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral9
Sample
66db285985f556e7e42d089e9eda4bca7cf71530079f9ae1ef9817ea84d21bc4.exe
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral10
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
out.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral12
Sample
out.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral13
Sample
out.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
out.exe
Resource
macos-20241101-en
Behavioral task
behavioral15
Sample
out.exe
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral16
Sample
out.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral17
Sample
out.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
out.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
out.exe
-
Size
658KB
-
MD5
638f50740d05e9141e3076d206d1a8fd
-
SHA1
ca7f90beba6f51a3fb08786eaba1208537fa786a
-
SHA256
d3fba98ab8520c9a355c4efec5bbd19ff729cd004080359de0331eb1adcab940
-
SHA512
372c4e17a1ea531f4b1e21d99af70e2a1c31e25dce42a47b5b17305803467c34000cb760dd598454326f046bdeeb1a8f967e1d987d58ee839ffd2b5f18cd28de
-
SSDEEP
12288:T9HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZK3/X:diBIGkbxqEcjsWiDxguehC2+
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2448 848 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language out.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 848 wrote to memory of 2448 848 out.exe 31 PID 848 wrote to memory of 2448 848 out.exe 31 PID 848 wrote to memory of 2448 848 out.exe 31 PID 848 wrote to memory of 2448 848 out.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\out.exeC:\Users\Admin\AppData\Local\Temp\out.exe dsrm -subtree -noprompt -c user"http://+:443"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 362⤵
- Program crash
PID:2448
-