Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 07:13

General

  • Target

    13da81b28b308884975e323f46a41b217a205aadf0f4297b9455520fe232f8ff.exe

  • Size

    5.0MB

  • MD5

    167ab93337fab4f0b33d3d851be4174c

  • SHA1

    0c4030e902d7f6595fdfbbf7aa5b9d3d087f3e43

  • SHA256

    13da81b28b308884975e323f46a41b217a205aadf0f4297b9455520fe232f8ff

  • SHA512

    0a9fd0fed9931328be4aa87d870e3ebd1b30681dd4256f78dc0f9d7de803463b09904eb62c9c87cb54263f4e2dc0928467c38d0f0ecd05193ca9d6e218d9a600

  • SSDEEP

    98304:M1vGs4i8eh6ruA9S6lp2kysNzX4nAyyWWaao03ZaGCrhUNO9vWHyLInPPp5Scl:M6imruA9S6GJUXW5azAWwLLInJoe

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13da81b28b308884975e323f46a41b217a205aadf0f4297b9455520fe232f8ff.exe
    "C:\Users\Admin\AppData\Local\Temp\13da81b28b308884975e323f46a41b217a205aadf0f4297b9455520fe232f8ff.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RegDm.dll

    Filesize

    52KB

    MD5

    fdc8b75a37017141831e3421479307be

    SHA1

    f6a08cc570d5e5bc4218da376ca353d46d62790d

    SHA256

    2a37ce301490bd4b7c5d02b768b054705fe4620db6ef81061718c1fe89c9f27e

    SHA512

    d74e2de28523317c928965affa464cef6ba5c4da9ab05d30a79a4d3bbb59284d68331b5735c705cf73e155cf3a42b01ef5cd7219c72c242eed6b711090066537

  • memory/3656-10-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-11-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-15-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-14-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-13-0x00000000770E3000-0x00000000770E4000-memory.dmp

    Filesize

    4KB

  • memory/3656-12-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-7-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-6-0x000000006FFF0000-0x0000000070000000-memory.dmp

    Filesize

    64KB

  • memory/3656-16-0x0000000002F30000-0x0000000002F6C000-memory.dmp

    Filesize

    240KB

  • memory/3656-9-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-8-0x00000000770E2000-0x00000000770E3000-memory.dmp

    Filesize

    4KB

  • memory/3656-23-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-29-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-28-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-27-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-26-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-25-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-24-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3656-30-0x0000000002F30000-0x0000000002F6C000-memory.dmp

    Filesize

    240KB