Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe
Resource
win7-20240705-en
General
-
Target
35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe
-
Size
197KB
-
MD5
cfb2eb856c183f53bdba297c340e324e
-
SHA1
7be0a5e36ebb4187262a43d3f3f635ff6ac54c45
-
SHA256
35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68
-
SHA512
64e4d2b1705367f4ac3d6ec946989663bcf84706dc5ae0023c8f08ad570db481cfb7e74e58eac19d959e31ff6a74989baca40ce293b367c381a6a0996b84a570
-
SSDEEP
3072:8WpdvpXm6STi7//Nigecsvxf654sS8M/rMjb26wcheg1COg8m+/XQIDst:PnvpXmiLmxD/rAb22eehPt
Malware Config
Extracted
stealc
nord
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3640 set thread context of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3640 wrote to memory of 2308 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 84 PID 3640 wrote to memory of 2308 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 84 PID 3640 wrote to memory of 2308 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 84 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85 PID 3640 wrote to memory of 4532 3640 35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe"C:\Users\Admin\AppData\Local\Temp\35192925cbaee8be87233ad7ff3ddc451e82595584aef28ae90568189cc39a68.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4532
-