Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
5dba7cd17466d25172134642ef4ea7b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5dba7cd17466d25172134642ef4ea7b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
5dba7cd17466d25172134642ef4ea7b0N.exe
-
Size
140KB
-
MD5
5dba7cd17466d25172134642ef4ea7b0
-
SHA1
eb96684eeaabd90e868db4961cbb741cc42bc5fd
-
SHA256
df3d22ad30c3b5a789e6a064a0c2311d88bcf33e001f9889308f13a8160a04dd
-
SHA512
c2b3d3a9f8b221705b21b1b16fda2984bbe794ed4dd4d98c547e35ba6ad93f60a5341320cf8023d2f57b27d639f1df7e7e6c18162893774563327910448dd0fe
-
SSDEEP
3072:FC+b/xEwBxygI9vj0AT1smXA3HizrYZ6oXHqBNI5xr:k+LxBxULrsr3CffoXKBy55
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 4892 ksygpla.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ksygpla.exe 5dba7cd17466d25172134642ef4ea7b0N.exe File created C:\PROGRA~3\Mozilla\arpkhqa.dll ksygpla.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dba7cd17466d25172134642ef4ea7b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksygpla.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dba7cd17466d25172134642ef4ea7b0N.exe"C:\Users\Admin\AppData\Local\Temp\5dba7cd17466d25172134642ef4ea7b0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5000
-
C:\PROGRA~3\Mozilla\ksygpla.exeC:\PROGRA~3\Mozilla\ksygpla.exe -vwpcxle1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5f9e3a95ef27b71a4e437865e8750b70f
SHA141d374b6b25aebb54dcd3b9d0cc5ecc4b7d91581
SHA2567f0cc5f0e5bf1f0f58d6d1b993b8a4af112b0d3a2d8e06698c74671f004e9057
SHA512d1d14780d7a110b189012877797954b01feac481463141d982d806f675b1bcd5d6a2a32a15118943a4894f46167e5885208f6d1e6bb9a7a6028fed4fbaa4f24d