Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
73ea745164e0995ae30155a01a409570N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73ea745164e0995ae30155a01a409570N.exe
Resource
win10v2004-20240802-en
General
-
Target
73ea745164e0995ae30155a01a409570N.exe
-
Size
93KB
-
MD5
73ea745164e0995ae30155a01a409570
-
SHA1
0024f29f5e209e46522794d3c10d599c379e0c2e
-
SHA256
291eb172f7e99c5610e64b598b80ad8b809668008f37d0b88907b20689662dc6
-
SHA512
06d9b8411aea55d5d94a1df06c3524412fa661285a2988476725a0d41100240d1e9b17053834390c13feeb1b5c242d1560c9717a55eb392b98e18b2f1f1324e0
-
SSDEEP
1536:lARFqvxZZ5OBx9aRfeM2ZMqUy+iZCdcHHPm91fGLL7s2XQhxAj6Ie5O:SRFqvxkMeM2SqrvCdT9eL7sdhxJd5O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1872 73ea745164e0995ae30155a01a409570N.exe -
Executes dropped EXE 1 IoCs
pid Process 1872 73ea745164e0995ae30155a01a409570N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73ea745164e0995ae30155a01a409570N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4256 73ea745164e0995ae30155a01a409570N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4256 73ea745164e0995ae30155a01a409570N.exe 1872 73ea745164e0995ae30155a01a409570N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4256 wrote to memory of 1872 4256 73ea745164e0995ae30155a01a409570N.exe 85 PID 4256 wrote to memory of 1872 4256 73ea745164e0995ae30155a01a409570N.exe 85 PID 4256 wrote to memory of 1872 4256 73ea745164e0995ae30155a01a409570N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\73ea745164e0995ae30155a01a409570N.exe"C:\Users\Admin\AppData\Local\Temp\73ea745164e0995ae30155a01a409570N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\73ea745164e0995ae30155a01a409570N.exeC:\Users\Admin\AppData\Local\Temp\73ea745164e0995ae30155a01a409570N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5077e5ac766e33618465b70cbcccea6db
SHA17a12adedcacf8c0be7a4dcb4428987a42519fcf6
SHA256065e1a1a9a63c846291ce6d66243289c2c0555cb7f8f05d1ce24328baf94b750
SHA51271cabca566eac476484f2bce90addf35fcbe786cabd4d6da5db0c44d587bf60db6a999e8582164f6ff78043f7844b729e240d74df0a2d3dba407a9552a4345e6