Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 22:34
Behavioral task
behavioral1
Sample
da824890b406e91dc00c1a466c65c4c0N.exe
Resource
win7-20240704-en
General
-
Target
da824890b406e91dc00c1a466c65c4c0N.exe
-
Size
2.7MB
-
MD5
da824890b406e91dc00c1a466c65c4c0
-
SHA1
a0d323bc6e3b7ac2b677bea1064f87d4a4f38ffb
-
SHA256
80cfbb437bea3100f5d80af49fb9fd3cd09367d43b88b7eb1d67b5480290b2cd
-
SHA512
bae761fd9b7d5a4a5ee6e1b8f9df9d3714cb1a3264b802a1e6a4400291c880413ad91c90c1ee0607bbab4be9719a05a09852ee5e1e522141c0537d404c05bad6
-
SSDEEP
49152:r/lshi8hiJNZiy17D/noHktXncR9p8bhJ1NR95Lpj+U7it/Q0H3ikAMmkO7R9j:RsdhiDx1P/nhXcHShP9J7kQ0H3ikm7Hj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3192 da824890b406e91dc00c1a466c65c4c0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3192 da824890b406e91dc00c1a466c65c4c0N.exe -
resource yara_rule behavioral2/memory/4488-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x00090000000233bc-11.dat upx behavioral2/memory/3192-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da824890b406e91dc00c1a466c65c4c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da824890b406e91dc00c1a466c65c4c0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4488 da824890b406e91dc00c1a466c65c4c0N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4488 da824890b406e91dc00c1a466c65c4c0N.exe 3192 da824890b406e91dc00c1a466c65c4c0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3192 4488 da824890b406e91dc00c1a466c65c4c0N.exe 84 PID 4488 wrote to memory of 3192 4488 da824890b406e91dc00c1a466c65c4c0N.exe 84 PID 4488 wrote to memory of 3192 4488 da824890b406e91dc00c1a466c65c4c0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\da824890b406e91dc00c1a466c65c4c0N.exe"C:\Users\Admin\AppData\Local\Temp\da824890b406e91dc00c1a466c65c4c0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\da824890b406e91dc00c1a466c65c4c0N.exeC:\Users\Admin\AppData\Local\Temp\da824890b406e91dc00c1a466c65c4c0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5beda5612195866471a39b7a6a22647c4
SHA19b190960547213dd350a4b10994479f01cfc8017
SHA256ccf957e9190ee616cb92220c092d1fecf2a898e93c0a756f04b4e1e156b5c5bf
SHA512e551d0b0590de9eed9f1c659a69c41b74444a9164b6d1c1243437a6888baf108f56a261e1cc8561524f0975ba4b4823582577453b6727bceb7afa0639207e028