Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Adware.Presenoker.31748.16935.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Adware.Presenoker.31748.16935.exe
Resource
win10v2004-20240730-en
General
-
Target
SecuriteInfo.com.Adware.Presenoker.31748.16935.exe
-
Size
1.9MB
-
MD5
547f31247f6b703d44039649c14c9329
-
SHA1
1ad10ee1dee9a612a081e8c3aa19f4ac96f4c445
-
SHA256
571c3afc06426f5006bd0d4ae40e50001caeb610c7c7c2cafb1a47c1d201a91d
-
SHA512
d70389b99e8c377dba7091724b4559b2e4a2596a9d540b31bdc53700ca0f1c876c260f5c8065f0bab4740676bb921d28387cbc146890cd6e36e40e5350f737c3
-
SSDEEP
49152:fYDGpx5cwHTVmUmYyIwzIdFlZadESQD6Pk+ZckPKyqb7XlsJzvzI65B/d:fJx5cak3EFlZaWSQD4ZclynjU6zV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Adware.Presenoker.31748.16935.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1844 SecuriteInfo.com.Adware.Presenoker.31748.16935.exe 1844 SecuriteInfo.com.Adware.Presenoker.31748.16935.exe 1844 SecuriteInfo.com.Adware.Presenoker.31748.16935.exe 1844 SecuriteInfo.com.Adware.Presenoker.31748.16935.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Presenoker.31748.16935.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Presenoker.31748.16935.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1844
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x46c1⤵PID:2400