Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 23:57

General

  • Target

    485a5704457f819f8a36cc807dc1fc80N.exe

  • Size

    500KB

  • MD5

    485a5704457f819f8a36cc807dc1fc80

  • SHA1

    1e4ae8866099267b7f7b5d934c967a6ae7c32d7b

  • SHA256

    b9125eaba6c0ba4f7404e34c8f446396567734a70ae80ce96365220c0e8cb333

  • SHA512

    9e7c1fabadc0430e129ad937faa386554597f1edac35111840903c0c139e82ca2f4fdd57b5fed6f0dfa0ecf0b8bd71ab5d115b951b2dd083230df6ad0ae1646f

  • SSDEEP

    12288:8WBm+95nHfF2mgewFx5q+UK5BMl1pfxpFP1kfgjdkA:8WBz95ndbgfx5q+UKYppFggjT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe
    "C:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Local\Temp\921E.tmp
      "C:\Users\Admin\AppData\Local\Temp\921E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe 72B0BA14A5448BB23161A0D3156319C63538EBEA2644C838682A74E5F03D84C16EC2F35C00B5CF807DBB1634F8384EB98275FA24D85834E9A0CB4F642948BF11
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\921E.tmp

    Filesize

    500KB

    MD5

    1c4f26153d427e8e016b3db9180d20f2

    SHA1

    b92179a8100525502961007ca15f2d820de2a1da

    SHA256

    cb00ace62469159eae4b178802393a1b47edefb7f1e28fcf3a66214b4d8745d9

    SHA512

    bb40ca12278fb48cb485c783fa756cccc1b0ede05235c4f9037540341354e2468897a9ef0248f7e0feb53bc7cad2c5ba1f97f24eecc82f3082e72741e9750eae

  • memory/4448-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4448-7-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4616-4-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4616-8-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB