Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 15:49
Behavioral task
behavioral1
Sample
191183d7f4955f24e1efac60f3957a50N.exe
Resource
win7-20240708-en
General
-
Target
191183d7f4955f24e1efac60f3957a50N.exe
-
Size
32KB
-
MD5
191183d7f4955f24e1efac60f3957a50
-
SHA1
4d3e8f377b64262abd1c92f25f3322d3b8108d3e
-
SHA256
23277d08d3004e141ee4a7881c9d95837cc0ae8910dc1ef8f37a9b9180982285
-
SHA512
2197f4ae791663fd0ba2a8fef5b87ca0694c87ac1456a02a79ec77e1a160b0af28fabb4fca76883a3e25baeb31ed6556aaea623d0d7638c3764e6547a06aed48
-
SSDEEP
768:pVClzjrE/WtpDxP3X4GdAk4U+eCXwmKwisk:ps1HyWtpDxfX4GdAk4U+eCzKrsk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3536 avgbrowse.exe -
resource yara_rule behavioral2/memory/116-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/files/0x0008000000023421-5.dat upx behavioral2/memory/116-7-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/3536-8-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 icanhazip.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 191183d7f4955f24e1efac60f3957a50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avgbrowse.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 3536 116 191183d7f4955f24e1efac60f3957a50N.exe 84 PID 116 wrote to memory of 3536 116 191183d7f4955f24e1efac60f3957a50N.exe 84 PID 116 wrote to memory of 3536 116 191183d7f4955f24e1efac60f3957a50N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\191183d7f4955f24e1efac60f3957a50N.exe"C:\Users\Admin\AppData\Local\Temp\191183d7f4955f24e1efac60f3957a50N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\avgbrowse.exeC:\Users\Admin\AppData\Local\Temp\avgbrowse.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD56d401b1738d74075e98ab0d1241142df
SHA110c1942a1d7089b15c1b09999422b5db1f2a1823
SHA256e0dcdb6cb2c269dc62eef1a8131576ad40c79c7ff17400788a4367a760f6b4dd
SHA51280e23c6d21a62129022879ad0e1abe027570e2cc8a0819ee7e24267b6b706781e92c61bb24c43bd3fb638d7431c429ae5f808e3c36cae3c20ffb0d2f2498898d