Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
13d9d392a83df392a215222cfa1c24d0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13d9d392a83df392a215222cfa1c24d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
13d9d392a83df392a215222cfa1c24d0N.exe
-
Size
92KB
-
MD5
13d9d392a83df392a215222cfa1c24d0
-
SHA1
72ff45cf3d00713a13e3996d111c049c1914921d
-
SHA256
d58b2875dfba8b985a57426ac88e027a8b153f5dbeac7a1d4dc19169cd2c6674
-
SHA512
91595cea1499f5650d05bab5162ba264d82adccd336572777bbc72b21ee92e887cf034fa3e380e3f6be549651b877ff64f4f0a8fc63ad8b81e4c9a1c1b862f23
-
SSDEEP
1536:rPMCbaGF4F02QIo0+x18+3pV3tpZYp7YRO2kzeu2i6cODIIA01JncGoRFTUofkda:rVbV46XVx18+TrZU7dztyIIFcpU7a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 440 13d9d392a83df392a215222cfa1c24d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 440 13d9d392a83df392a215222cfa1c24d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13d9d392a83df392a215222cfa1c24d0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2424 13d9d392a83df392a215222cfa1c24d0N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2424 13d9d392a83df392a215222cfa1c24d0N.exe 440 13d9d392a83df392a215222cfa1c24d0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2424 wrote to memory of 440 2424 13d9d392a83df392a215222cfa1c24d0N.exe 85 PID 2424 wrote to memory of 440 2424 13d9d392a83df392a215222cfa1c24d0N.exe 85 PID 2424 wrote to memory of 440 2424 13d9d392a83df392a215222cfa1c24d0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\13d9d392a83df392a215222cfa1c24d0N.exe"C:\Users\Admin\AppData\Local\Temp\13d9d392a83df392a215222cfa1c24d0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\13d9d392a83df392a215222cfa1c24d0N.exeC:\Users\Admin\AppData\Local\Temp\13d9d392a83df392a215222cfa1c24d0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD511b784755afe7ce92e8bf395909da272
SHA1b5439aa9e4d3a11059235b83abb70df614f37f52
SHA256f85c050d9832f9a4462bc2882d91f1f377c03c1c2e22f1ba9a400a3113b386f4
SHA5123ba952e825973c4c1650f4ae315aced7a2ff8962fe822eff099573da413f38e8cda8edd2e4e5e1a8d2ac47b96d4c450d396174d07601e2118fc654a22a621c34