Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
46736328165a460065ef4498588cfe80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46736328165a460065ef4498588cfe80N.exe
Resource
win10v2004-20240802-en
General
-
Target
46736328165a460065ef4498588cfe80N.exe
-
Size
91KB
-
MD5
46736328165a460065ef4498588cfe80
-
SHA1
d7127b3fe6d0e2fa19ea82b8a216492190ebaf41
-
SHA256
a0fc7256d85e68d85ff0b89775e5442889ea8c6f5ce4c835a840c02841302f1d
-
SHA512
b6fde2d4b73852c211d380942b4218684844ab97f99eebc212d873adcd3e3b776b390c35b5d3e2913fab1518ced91c20ea44ba767303877496ac8c1e054fe75f
-
SSDEEP
1536:8F0Jgn6nVFJTsZoXl3vGJyf5mp5JoubyyJGZp04a1h4ZPNGf0obDvGBSArhjBR:zsqJTsilSB12aKa4akNGnbDvGBS2d
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 46736328165a460065ef4498588cfe80N.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 46736328165a460065ef4498588cfe80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46736328165a460065ef4498588cfe80N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1080 46736328165a460065ef4498588cfe80N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1080 46736328165a460065ef4498588cfe80N.exe 2744 46736328165a460065ef4498588cfe80N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2744 1080 46736328165a460065ef4498588cfe80N.exe 85 PID 1080 wrote to memory of 2744 1080 46736328165a460065ef4498588cfe80N.exe 85 PID 1080 wrote to memory of 2744 1080 46736328165a460065ef4498588cfe80N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\46736328165a460065ef4498588cfe80N.exe"C:\Users\Admin\AppData\Local\Temp\46736328165a460065ef4498588cfe80N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\46736328165a460065ef4498588cfe80N.exeC:\Users\Admin\AppData\Local\Temp\46736328165a460065ef4498588cfe80N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD536760b7d7214bd84c533082411b987ea
SHA1760b7c16a0244efdf58cd6888f4f944ec00cf0ce
SHA256e30fbb38f979ffe3691365b321c82ec78f7a4f95341eb34da9f4d1f3bd4cb8cc
SHA512a048642ec62b17c34c408a26cffe66d10ccef75a59b2595106cdf5d8fb88041841155fd1d288993265501377e9e8effe357849a7421a7e0a6fb0688e945cfb2f