Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 09:31

General

  • Target

    autoplay.exe

  • Size

    1.7MB

  • MD5

    c815d3ce2b9322cd1e9afeb41469a697

  • SHA1

    8385cddef3646ebc64248355e82b356b79f7a08d

  • SHA256

    9f0970baaac26a9a3ab1c1d43d7f2c59022958304d8cf981206c32fbbded7d2b

  • SHA512

    67bd66c5b7d2b13916bbdc7b94c86ffd66a6e512aaa3dfecf34bb4da0f083eec24adf430e954622cc7dd43dac478418552d34d76571968752c709273c2a9c489

  • SSDEEP

    24576:E4nXubIQGyxbPV0db26s1yc0ro34GWp4WxwmNoZNv+sZGjaHRdVi4:Eqe3f6m084H4WxwmNGVxzi4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\autoplay.exe
    "C:\Users\Admin\AppData\Local\Temp\autoplay.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\is-BD2GH.tmp\autoplay.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BD2GH.tmp\autoplay.tmp" /SL5="$70052,953344,0,C:\Users\Admin\AppData\Local\Temp\autoplay.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-BD2GH.tmp\autoplay.tmp

    Filesize

    3.1MB

    MD5

    11104a3bfea1536c55d3a44b6ef2dc58

    SHA1

    923913bcf59bebd30616b30a01f98206fae50406

    SHA256

    0d98fe43b529f8a6d4922819457f6fd08398cc9c219dcd18925ef0073c0310f5

    SHA512

    cc59eef607fedcf30023677a44a9bb1d0d53f836af80589862f5e5cbf20ece36e6d749f5b50f21a2f53800453bc634d7bff964dc81be8eb57394f0f3caaf5763

  • memory/964-7-0x0000000000400000-0x0000000000730000-memory.dmp

    Filesize

    3.2MB

  • memory/964-12-0x0000000000400000-0x0000000000730000-memory.dmp

    Filesize

    3.2MB

  • memory/2256-1-0x0000000000400000-0x00000000004F6000-memory.dmp

    Filesize

    984KB

  • memory/2256-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2256-11-0x0000000000400000-0x00000000004F6000-memory.dmp

    Filesize

    984KB