Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
108s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 16:40
Behavioral task
behavioral1
Sample
ad5929c42f5fd84cb2de41c69002cd90N.exe
Resource
win7-20240729-en
General
-
Target
ad5929c42f5fd84cb2de41c69002cd90N.exe
-
Size
4.7MB
-
MD5
ad5929c42f5fd84cb2de41c69002cd90
-
SHA1
a3ff651130c72c808737092db58cf46c56655a31
-
SHA256
b61618967ed69bad6f857b0298e3dde9bd61217f0afcd1f757e45d60770234d9
-
SHA512
489e257fd342246b1f401e7b6cb196ff48f40f9d9c31689849130743d699b28fd330f5a2a027464e2de45e8a1de4eee87f318dfd3037e05480db7777d7769259
-
SSDEEP
49152:G51pswgKqMHOKOScjxkF7oF4RdyljMiLo9UeWtUux/7n4OkkPN:G5j1NOLStF7/GMiptFx/c61
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1068 ad5929c42f5fd84cb2de41c69002cd90N.exe -
Executes dropped EXE 1 IoCs
pid Process 1068 ad5929c42f5fd84cb2de41c69002cd90N.exe -
resource yara_rule behavioral2/memory/3220-0-0x0000000000400000-0x0000000000CE1000-memory.dmp upx behavioral2/files/0x000800000002346c-12.dat upx behavioral2/memory/1068-14-0x0000000000400000-0x0000000000CE1000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad5929c42f5fd84cb2de41c69002cd90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad5929c42f5fd84cb2de41c69002cd90N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3220 ad5929c42f5fd84cb2de41c69002cd90N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3220 ad5929c42f5fd84cb2de41c69002cd90N.exe 1068 ad5929c42f5fd84cb2de41c69002cd90N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3220 wrote to memory of 1068 3220 ad5929c42f5fd84cb2de41c69002cd90N.exe 87 PID 3220 wrote to memory of 1068 3220 ad5929c42f5fd84cb2de41c69002cd90N.exe 87 PID 3220 wrote to memory of 1068 3220 ad5929c42f5fd84cb2de41c69002cd90N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad5929c42f5fd84cb2de41c69002cd90N.exe"C:\Users\Admin\AppData\Local\Temp\ad5929c42f5fd84cb2de41c69002cd90N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\ad5929c42f5fd84cb2de41c69002cd90N.exeC:\Users\Admin\AppData\Local\Temp\ad5929c42f5fd84cb2de41c69002cd90N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD594b477df0799412d3ccc686fb3cad23d
SHA1f53ae70ab64f6ea9a529cbb6807399c7ea5ed282
SHA25625b4c8ae6b8bbfd30a73101b44dc99aac670c7d2e4428e4d0bb829ca56871adc
SHA5125cf2f710b1c0fa8691d9a7b1b7ad01fa40c88cd4b17c98acc8bd962fb55d08b3c02aabb9bd7be5eb173df0038bce9762ef622b47e7ec245b9d587fb6ad0d4d42