Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08/02/2025, 00:22
Behavioral task
behavioral1
Sample
1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe
Resource
win7-20241010-en
General
-
Target
1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe
-
Size
114KB
-
MD5
9bf15605ac5d90b93d2d78781bdbcd20
-
SHA1
2eaa45ef0595fb8383ea74e4d38ab6a8d7af64e4
-
SHA256
1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69d
-
SHA512
f2d97433656b66faecb490f3a26b220a93a95cdb0c7ed6b0692e5dc712d70d1d362253de025f05d6909814b29a2a65cb5c4d630b764f23f1dae6502f208a2ee5
-
SSDEEP
1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgz:c0hpgz6xGhYJF30Blr0nhoutTRgz
Malware Config
Signatures
-
Sakula family
-
Sakula payload 6 IoCs
resource yara_rule behavioral1/memory/2604-0-0x0000000001300000-0x0000000001321000-memory.dmp family_sakula behavioral1/files/0x0009000000016ace-7.dat family_sakula behavioral1/memory/2172-11-0x0000000001050000-0x0000000001071000-memory.dmp family_sakula behavioral1/memory/2604-12-0x0000000001300000-0x0000000001321000-memory.dmp family_sakula behavioral1/memory/2172-15-0x0000000001050000-0x0000000001071000-memory.dmp family_sakula behavioral1/memory/2604-16-0x0000000001300000-0x0000000001321000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2292 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 MediaCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe -
resource yara_rule behavioral1/memory/2604-0-0x0000000001300000-0x0000000001321000-memory.dmp upx behavioral1/files/0x0009000000016ace-7.dat upx behavioral1/memory/2172-11-0x0000000001050000-0x0000000001071000-memory.dmp upx behavioral1/memory/2604-12-0x0000000001300000-0x0000000001321000-memory.dmp upx behavioral1/memory/2172-15-0x0000000001050000-0x0000000001071000-memory.dmp upx behavioral1/memory/2604-16-0x0000000001300000-0x0000000001321000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2292 cmd.exe 2712 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2712 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2172 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 29 PID 2604 wrote to memory of 2172 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 29 PID 2604 wrote to memory of 2172 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 29 PID 2604 wrote to memory of 2172 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 29 PID 2604 wrote to memory of 2292 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 31 PID 2604 wrote to memory of 2292 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 31 PID 2604 wrote to memory of 2292 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 31 PID 2604 wrote to memory of 2292 2604 1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe 31 PID 2292 wrote to memory of 2712 2292 cmd.exe 33 PID 2292 wrote to memory of 2712 2292 cmd.exe 33 PID 2292 wrote to memory of 2712 2292 cmd.exe 33 PID 2292 wrote to memory of 2712 2292 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe"C:\Users\Admin\AppData\Local\Temp\1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1234e87f2701c4a70ecdf74cf6c787e01fa4d5fc1b08917cf2570f1b412ae69dN.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD51ecb668ac38c63e5847d49d7ad8c1218
SHA104af394c0c8854eacd439f24cef8f9c6e46f1b61
SHA256320509f38acf3edd63acced7ea89949e3048072d8914632f7e04a700673b775d
SHA5121191bc7afbded10e009154df6a17a375d1aea44692d6876e4dd1f2fba7e2beda11b4de41d4f4ce406260537552c9732cf6f524e78e1de25bbb0c1b3a5efd592d