Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
485a5704457f819f8a36cc807dc1fc80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
485a5704457f819f8a36cc807dc1fc80N.exe
Resource
win10v2004-20240802-en
General
-
Target
485a5704457f819f8a36cc807dc1fc80N.exe
-
Size
500KB
-
MD5
485a5704457f819f8a36cc807dc1fc80
-
SHA1
1e4ae8866099267b7f7b5d934c967a6ae7c32d7b
-
SHA256
b9125eaba6c0ba4f7404e34c8f446396567734a70ae80ce96365220c0e8cb333
-
SHA512
9e7c1fabadc0430e129ad937faa386554597f1edac35111840903c0c139e82ca2f4fdd57b5fed6f0dfa0ecf0b8bd71ab5d115b951b2dd083230df6ad0ae1646f
-
SSDEEP
12288:8WBm+95nHfF2mgewFx5q+UK5BMl1pfxpFP1kfgjdkA:8WBz95ndbgfx5q+UKYppFggjT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4616 921E.tmp -
Executes dropped EXE 1 IoCs
pid Process 4616 921E.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 485a5704457f819f8a36cc807dc1fc80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 921E.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4616 921E.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4616 4448 485a5704457f819f8a36cc807dc1fc80N.exe 84 PID 4448 wrote to memory of 4616 4448 485a5704457f819f8a36cc807dc1fc80N.exe 84 PID 4448 wrote to memory of 4616 4448 485a5704457f819f8a36cc807dc1fc80N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe"C:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\921E.tmp"C:\Users\Admin\AppData\Local\Temp\921E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\485a5704457f819f8a36cc807dc1fc80N.exe 72B0BA14A5448BB23161A0D3156319C63538EBEA2644C838682A74E5F03D84C16EC2F35C00B5CF807DBB1634F8384EB98275FA24D85834E9A0CB4F642948BF112⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500KB
MD51c4f26153d427e8e016b3db9180d20f2
SHA1b92179a8100525502961007ca15f2d820de2a1da
SHA256cb00ace62469159eae4b178802393a1b47edefb7f1e28fcf3a66214b4d8745d9
SHA512bb40ca12278fb48cb485c783fa756cccc1b0ede05235c4f9037540341354e2468897a9ef0248f7e0feb53bc7cad2c5ba1f97f24eecc82f3082e72741e9750eae