Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 11:26

General

  • Target

    1e58a8ce848fae7ac2a8d4fcd87cdd6d895024cf15dc2499f2aafe9717011a36.exe

  • Size

    80KB

  • MD5

    42074dc519066af487b4b9440ce42a30

  • SHA1

    5a85a4120edd7de87665b8fe6457e69f2c1c15f8

  • SHA256

    1e58a8ce848fae7ac2a8d4fcd87cdd6d895024cf15dc2499f2aafe9717011a36

  • SHA512

    701b82e3b6be9a32bf160f70b31bd47213a3ef91b4dd3e4d48f42a8c0186eb25c33b351d9c3c1529dc53182d63215293d4c3788a8a796617c6bf66bd16077a3b

  • SSDEEP

    1536:45coBuVU67gccYy53JDAAZpW4oYkguWe3i6E27:OBQU67h7

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e58a8ce848fae7ac2a8d4fcd87cdd6d895024cf15dc2499f2aafe9717011a36.exe
    "C:\Users\Admin\AppData\Local\Temp\1e58a8ce848fae7ac2a8d4fcd87cdd6d895024cf15dc2499f2aafe9717011a36.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\deuhueh.exe
      "C:\Users\Admin\deuhueh.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\deuhueh.exe

    Filesize

    80KB

    MD5

    ea6d84a2dc77bccae970960b81d0f35f

    SHA1

    d85206dcccdfc75e25baa760f3972cefe394dd49

    SHA256

    d3d7f7de74859f389008dcb3c145c53595db1e921dd5e4c3e9c7b66d0bb13de7

    SHA512

    4bdffd6a83034644a2e45672220c575bf57bb8572e2ea7a63690abc1478a0d40b8b7f6647f319f151f2122c92b8c74f4b14f2ce5cb7723696c0d7c0bce343863