Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
fe7068de4977730de984f6f64276ac40N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe7068de4977730de984f6f64276ac40N.exe
Resource
win10v2004-20240802-en
General
-
Target
fe7068de4977730de984f6f64276ac40N.exe
-
Size
1.7MB
-
MD5
fe7068de4977730de984f6f64276ac40
-
SHA1
8048446ef41aefb9e8527af313e96bfb5d9f86e7
-
SHA256
c02aa4559762d16b9fad2e0653a7ceaa27a758675af7ad51cd0defc5f73b856f
-
SHA512
7e5406862d25c01d46e85c6cf848d4f3b295da8114cbe37570ebbf388cf2225c2e3f9226cf7dff3dc4c09529b66e0f2323d8a2e280216ac37fc1b0a76276f3a2
-
SSDEEP
24576:Z7FUDowAyrTVE3U5F1CxMET3L39L1CCJYHXy1ZSoRnIRST2b+vKtL9mxZNXqCe2:ZBuZrEUWXjCtHwZSoRnkcy5mtqI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2484 fe7068de4977730de984f6f64276ac40N.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe7068de4977730de984f6f64276ac40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe7068de4977730de984f6f64276ac40N.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 2484 4444 fe7068de4977730de984f6f64276ac40N.exe 86 PID 4444 wrote to memory of 2484 4444 fe7068de4977730de984f6f64276ac40N.exe 86 PID 4444 wrote to memory of 2484 4444 fe7068de4977730de984f6f64276ac40N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe7068de4977730de984f6f64276ac40N.exe"C:\Users\Admin\AppData\Local\Temp\fe7068de4977730de984f6f64276ac40N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\is-72MSU.tmp\fe7068de4977730de984f6f64276ac40N.tmp"C:\Users\Admin\AppData\Local\Temp\is-72MSU.tmp\fe7068de4977730de984f6f64276ac40N.tmp" /SL5="$D002E,840718,816128,C:\Users\Admin\AppData\Local\Temp\fe7068de4977730de984f6f64276ac40N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5b9dd1c1e746c37a247a4851c655db5eb
SHA1e055fba0b073c813d3136f6be70dd9f111a736ad
SHA256f8d45949d04e1e4ef80aa374365cfff9fe257e599d8ec01fd5953440ec86b3b5
SHA512e37dfa9f230c474cb99067b47e97a5f624849d8138574d64280ebc221038b6fc3531693a6786e7e1ede5026b097db37c77529af175d45db63c2b25bafb71434a