Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
9a5421854850d3e5bd213b6905333e70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9a5421854850d3e5bd213b6905333e70N.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
9a5421854850d3e5bd213b6905333e70N.exe
-
Size
4.2MB
-
MD5
9a5421854850d3e5bd213b6905333e70
-
SHA1
1ba82fbde3f6749707adb4241d97f45b94c8ba9a
-
SHA256
7fbcb0b1127df303f5dfcf9c7f1b4e24daea2273d7312b2e82b0b7ca86f12ed5
-
SHA512
a262803af481665b57369cfb04882dc691e24404d40c3e7e405bfbea01c96d5b634e5d6026f772d42103e2e7b22574bae7d51ddd5fe29e2cc8bdd94830dcfbc9
-
SSDEEP
98304:Cmhd1UryeKw57V0WBkjqpz0HmbVLUjH5oxFbxhVLUjH5oxFbx:ClhBqc0MombVUjZEdhVUjZEd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2436 7DDB.tmp -
Executes dropped EXE 1 IoCs
pid Process 2436 7DDB.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a5421854850d3e5bd213b6905333e70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DDB.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2436 2208 9a5421854850d3e5bd213b6905333e70N.exe 87 PID 2208 wrote to memory of 2436 2208 9a5421854850d3e5bd213b6905333e70N.exe 87 PID 2208 wrote to memory of 2436 2208 9a5421854850d3e5bd213b6905333e70N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a5421854850d3e5bd213b6905333e70N.exe"C:\Users\Admin\AppData\Local\Temp\9a5421854850d3e5bd213b6905333e70N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"C:\Users\Admin\AppData\Local\Temp\7DDB.tmp" --splashC:\Users\Admin\AppData\Local\Temp\9a5421854850d3e5bd213b6905333e70N.exe 164E2CB7FCF49811855011D0C41B3766EA50A4D5241B145306EA55A8DC8CBF151DFF704C504D2D42BAD37C37CE5ADA96A288AE2DFDDDB5340E5C6BC1B093B2562⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5db648374e67ec880c1fdee590312f402
SHA1c8821cf2d436dd42a434b94b5f7fc1bf2cf967b5
SHA2568249038a294aad036a9da377a98f71c3eb327861af44d5d19a2683c648a37398
SHA512a7a10fecef878db90a84c2e6803abb168f8894bdea90bc37e485604bb3dc61c1e38176670441e5f77be7cc515a0b546322aa934310aa94cd0e17bf20996fccf2