Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/03/2025, 14:23
250312-rqc5jsvjz9 10Analysis
-
max time kernel
10s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
097910dc615bd581069c0ec67fa513d0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
097910dc615bd581069c0ec67fa513d0.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
19771cc7d4a738eb3e879d7a537dc260.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
19771cc7d4a738eb3e879d7a537dc260.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
29c5c99473748778ee6bdd60dc8ef6d7.vir
Resource
debian12-armhf-20240729-en
Behavioral task
behavioral6
Sample
29d9976d73aabf191eafe0f8b045cc85.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
29d9976d73aabf191eafe0f8b045cc85.exe
Resource
win10v2004-20250217-en
General
-
Target
19771cc7d4a738eb3e879d7a537dc260.exe
-
Size
159KB
-
MD5
19771cc7d4a738eb3e879d7a537dc260
-
SHA1
eb8b05f48826a090c3f84d468d3986a121bc0cd5
-
SHA256
cac09c5751194795eb27b2daf641bee4afbcb1638095d7055e89c9c505af038f
-
SHA512
688c47b760c6ba14ede8c1e5bb708e5ade001b0e866c6a87139a452fe9cca0d0bd88967ad4ed80f0129d30e7c7fdb9d839c5e0f051a28bceaec9c776f26df549
-
SSDEEP
3072:fydfi5NYbjCOqGRhEkH8f4n3fIfkBo6Yn3EWejU:fyhi5N+OOLRikH8fEgsLYUO
Malware Config
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Globeimposter family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Roaming\\19771cc7d4a738eb3e879d7a537dc260.exe" 19771cc7d4a738eb3e879d7a537dc260.exe -
Drops desktop.ini file(s) 6 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-677481364-2238709445-1347953534-1000\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Videos\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19771cc7d4a738eb3e879d7a537dc260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 696 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2412 19771cc7d4a738eb3e879d7a537dc260.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 696 taskkill.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 696 2412 19771cc7d4a738eb3e879d7a537dc260.exe 31 PID 2412 wrote to memory of 696 2412 19771cc7d4a738eb3e879d7a537dc260.exe 31 PID 2412 wrote to memory of 696 2412 19771cc7d4a738eb3e879d7a537dc260.exe 31 PID 2412 wrote to memory of 696 2412 19771cc7d4a738eb3e879d7a537dc260.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\19771cc7d4a738eb3e879d7a537dc260.exe"C:\Users\Admin\AppData\Local\Temp\19771cc7d4a738eb3e879d7a537dc260.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 24122⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD544c9bc6a7a5a338db69f9310cf7e2b64
SHA1b43cba78c56cf30094252cd61aa49a3d8c05baf1
SHA25623d463aa817ee9033580c3475061daee4a0e44b3ebec87cbf5ea79401e2e1ac8
SHA51292963f4bba1bba5ca5ac4a252acce77033b150c9bef56226ef33db87f390ffcb511a89c37eaf5d68e40a236faf940e821470349e2505c14ae1a1e07664db2f2d