Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
8728f416cc909f393523406851f6aac0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8728f416cc909f393523406851f6aac0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8728f416cc909f393523406851f6aac0N.exe
-
Size
7.8MB
-
MD5
8728f416cc909f393523406851f6aac0
-
SHA1
1cbec0a89eba1b128c3b50dd3fed9a1ff0a61b46
-
SHA256
f6f157d8f0d93052dc8cb8152bbf42c1d88316f3a1f55a02d25d6daf0a09a960
-
SHA512
00aa80fad809263e79221135b4d0edea4240dc1fb8e4e1d0bd4b23704696bab27bc8ab6cee7613f5a43f1d8d74cfb900bcd9a14be42e7f4b30fa1a57e0eaf67d
-
SSDEEP
98304:emhd1Urye5/WkimUy4MK6vu6/UV7wQqZUha5jtSyZIUb:elJPimf4SW6/U2QbaZtli
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 540 9BF2.tmp -
Executes dropped EXE 1 IoCs
pid Process 540 9BF2.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8728f416cc909f393523406851f6aac0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9BF2.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2840 wrote to memory of 540 2840 8728f416cc909f393523406851f6aac0N.exe 87 PID 2840 wrote to memory of 540 2840 8728f416cc909f393523406851f6aac0N.exe 87 PID 2840 wrote to memory of 540 2840 8728f416cc909f393523406851f6aac0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe"C:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\9BF2.tmp"C:\Users\Admin\AppData\Local\Temp\9BF2.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe B9B35888172C1D7AB32AA7D140E9D454665A574D50F7FA2D04E6BAFA0118DE3BC750EF0166EC93F09044AB13EAFA3C59AA9849399558206276FFED5A5DCF87C02⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD56025685b71310bb7c031e40c95485493
SHA144de7e767a1b0857fce40de2991fc7fca007da04
SHA256edddb9b6916b4336fcaf554c6e4481101d4e119ad41d29665d58065600d40e2d
SHA5123804dc13169a92a4953af7302521f325b01cc0fa76ddde7a13b88f080f8961f2c2c0f2723fbe8bdd9ee21de0ddbf1687ec0dfc9ae39f39709d0e7e8987d80ecf