Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 01:51
Behavioral task
behavioral1
Sample
155ɫվ.url
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
155ɫվ.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
HiDownloadPlatinum.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
HiDownloadPlatinum.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
keygen.exe
Resource
win7-20240704-en
General
-
Target
HiDownloadPlatinum.exe
-
Size
3.9MB
-
MD5
061ca0f4ac437ea0a3f13367d006a6ab
-
SHA1
ccbb73a78ea4e170cb15b568a7f10b1986c416fe
-
SHA256
57f7c933f35c6efcf1f6d04aefde944f533a2bbb761d44312125dbb520faafc5
-
SHA512
12579c76951a8963ae38cfef13afb56f496f8e76779c4f3b099bb0ef034e8ed4382e2853ef0c7d47186e69f3ae50b76335ddb456f99daa21d268cf17327315ed
-
SSDEEP
98304:QNTUFzBYhFHzQdOfFYIZ3XJlQKy9bMA93:YON+JQdeVp5lQKK93
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 908 HiDownloadPlatinum.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HiDownloadPlatinum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HiDownloadPlatinum.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1040 wrote to memory of 908 1040 HiDownloadPlatinum.exe 84 PID 1040 wrote to memory of 908 1040 HiDownloadPlatinum.exe 84 PID 1040 wrote to memory of 908 1040 HiDownloadPlatinum.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\HiDownloadPlatinum.exe"C:\Users\Admin\AppData\Local\Temp\HiDownloadPlatinum.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\is-6HNAQ.tmp\HiDownloadPlatinum.tmp"C:\Users\Admin\AppData\Local\Temp\is-6HNAQ.tmp\HiDownloadPlatinum.tmp" /SL5="$B0060,3769370,54272,C:\Users\Admin\AppData\Local\Temp\HiDownloadPlatinum.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687KB
MD58f144bcbcad0417e7823dd8e60218530
SHA19df092a764b8ad278ed574f00d1c065683eef6ac
SHA25639dfa032878743bba8244c73173c263e669131f0084a38f22c52b1383f627ba0
SHA512e093f69030fee17d8b55bde8337d409e8dfb583c97a81ed37425fb72122318d4c1f996d0d1bca28f24182ff5c8afe2be25eadc27951463ddca5c0abceca2a72d