Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    11/05/2024, 18:33

General

  • Target

    No Recoil Installer.exe

  • Size

    838KB

  • MD5

    7b8c0e66d1693cfc254c2e4f1dfd2d26

  • SHA1

    3e0e7f07b84f840ddca93969f3dbbce278678ca3

  • SHA256

    25de15512f17ee7907b27def06534a7e562483c46a03da5f8aa0ebb162055ad0

  • SHA512

    1ad0f42c79a2dfeb088cba1423ed284d0f35a86c7e2a0972316bfc7b0a523e6e47369e0706798243b60f9d3b9933c4a3bb34c7d55bc577c457304f4c1be17fac

  • SSDEEP

    12288:LtWXR6Bnf+Tac0RDffXJjyYpCMoNHSy5viczyIH047K0fXJjyppyO:xWXslf+2DR7BWYpCMo44l5O0BWppyO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\No Recoil Installer.exe
    "C:\Users\Admin\AppData\Local\Temp\No Recoil Installer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    PID:4432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Tmp6244.tmp

    Filesize

    1KB

    MD5

    a10f31fa140f2608ff150125f3687920

    SHA1

    ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b

    SHA256

    28c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6

    SHA512

    cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12

  • memory/4432-25-0x0000029DF0350000-0x0000029DF0376000-memory.dmp

    Filesize

    152KB

  • memory/4432-1-0x0000029DD3650000-0x0000029DD3720000-memory.dmp

    Filesize

    832KB

  • memory/4432-3-0x00007FFB23940000-0x00007FFB24401000-memory.dmp

    Filesize

    10.8MB

  • memory/4432-4-0x0000029DEF6F0000-0x0000029DEF7F2000-memory.dmp

    Filesize

    1.0MB

  • memory/4432-5-0x0000029DEF600000-0x0000029DEF620000-memory.dmp

    Filesize

    128KB

  • memory/4432-6-0x0000029DEF800000-0x0000029DEF8BA000-memory.dmp

    Filesize

    744KB

  • memory/4432-0-0x00007FFB23943000-0x00007FFB23945000-memory.dmp

    Filesize

    8KB

  • memory/4432-21-0x0000029DEF620000-0x0000029DEF632000-memory.dmp

    Filesize

    72KB

  • memory/4432-22-0x0000029DEF680000-0x0000029DEF6BC000-memory.dmp

    Filesize

    240KB

  • memory/4432-23-0x0000029DEF640000-0x0000029DEF660000-memory.dmp

    Filesize

    128KB

  • memory/4432-2-0x0000029DD53E0000-0x0000029DD53EA000-memory.dmp

    Filesize

    40KB

  • memory/4432-24-0x0000029DEF5F0000-0x0000029DEF5F8000-memory.dmp

    Filesize

    32KB

  • memory/4432-29-0x00007FFB23940000-0x00007FFB24401000-memory.dmp

    Filesize

    10.8MB

  • memory/4432-27-0x0000029DF32E0000-0x0000029DF3318000-memory.dmp

    Filesize

    224KB

  • memory/4432-28-0x0000029DF0390000-0x0000029DF039E000-memory.dmp

    Filesize

    56KB

  • memory/4432-30-0x0000029DF2560000-0x0000029DF2568000-memory.dmp

    Filesize

    32KB

  • memory/4432-26-0x00007FFB23940000-0x00007FFB24401000-memory.dmp

    Filesize

    10.8MB

  • memory/4432-31-0x0000029DF36B0000-0x0000029DF3836000-memory.dmp

    Filesize

    1.5MB

  • memory/4432-32-0x0000029DF3840000-0x0000029DF3950000-memory.dmp

    Filesize

    1.1MB

  • memory/4432-33-0x00007FFB23940000-0x00007FFB24401000-memory.dmp

    Filesize

    10.8MB

  • memory/4432-34-0x00007FFB23943000-0x00007FFB23945000-memory.dmp

    Filesize

    8KB

  • memory/4432-35-0x00007FFB23940000-0x00007FFB24401000-memory.dmp

    Filesize

    10.8MB

  • memory/4432-36-0x00007FFB23940000-0x00007FFB24401000-memory.dmp

    Filesize

    10.8MB

  • memory/4432-37-0x00007FFB23940000-0x00007FFB24401000-memory.dmp

    Filesize

    10.8MB