Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08/02/2025, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
8a7d9050e75212d4dbd0fefd6bd8991536cea0681c8c546def30c0aeffb03086.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8a7d9050e75212d4dbd0fefd6bd8991536cea0681c8c546def30c0aeffb03086.exe
Resource
win10v2004-20250207-en
General
-
Target
8a7d9050e75212d4dbd0fefd6bd8991536cea0681c8c546def30c0aeffb03086.exe
-
Size
11.0MB
-
MD5
f8519a5128da45ae2b31e9a43e4c00f2
-
SHA1
02db2947e7b956330ce82bb945afa7cf6adb4b3d
-
SHA256
8a7d9050e75212d4dbd0fefd6bd8991536cea0681c8c546def30c0aeffb03086
-
SHA512
fb2a89a3409ebf994b90731b9db2e4338f4a704eaac4ccb0f43c4f72fcf0d4409e48c34b68f39874276bca25ecfcf42c9e3e15aa5754c4fcfc720f0b19df0975
-
SSDEEP
196608:Sx35ATT0EjrmbLs2yVUqdq+dxCsj95+CFWGlHSptgALx9/E4/:SxS0Ejy6Uqo+dxL5ZDkxb/
Malware Config
Extracted
raccoon
85feebea1136a9936dfbd2a3b6999b23
http://37.120.238.179/
-
user_agent
AYAYAYAY1337
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral1/memory/1688-6-0x0000000000400000-0x00000000016FF000-memory.dmp family_raccoon_v2 behavioral1/memory/1688-8-0x0000000000400000-0x00000000016FF000-memory.dmp family_raccoon_v2 behavioral1/memory/1688-9-0x0000000000400000-0x00000000016FF000-memory.dmp family_raccoon_v2 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a7d9050e75212d4dbd0fefd6bd8991536cea0681c8c546def30c0aeffb03086.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1688 8a7d9050e75212d4dbd0fefd6bd8991536cea0681c8c546def30c0aeffb03086.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a7d9050e75212d4dbd0fefd6bd8991536cea0681c8c546def30c0aeffb03086.exe"C:\Users\Admin\AppData\Local\Temp\8a7d9050e75212d4dbd0fefd6bd8991536cea0681c8c546def30c0aeffb03086.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688