Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
744335901ff9a68bf197e0669d073390N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
744335901ff9a68bf197e0669d073390N.exe
Resource
win10v2004-20240802-en
General
-
Target
744335901ff9a68bf197e0669d073390N.exe
-
Size
1.9MB
-
MD5
744335901ff9a68bf197e0669d073390
-
SHA1
84a3648b7d2d9c983e1faefd8bdeb7547aa43392
-
SHA256
1d9a9a8d1da327f36e5f6816b37ba24b0abd5054dcdee4018f708b9f7ac8d3f2
-
SHA512
878b5a45ad7461c5ef9e71c536159d53e35ee40c6e4e5cdec9d8c9149237aabe57cc5f2803b9b456485271b9d1c48affbe958fbc292c5b2f7777d0b004756081
-
SSDEEP
49152:Taxl0gXDWVetuRZmXYZmSadfqkbazR0vKLXZV:O3sxRZmIZmSadfqoatuKLXZV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1452 AE60.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 744335901ff9a68bf197e0669d073390N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AE60.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1452 4732 744335901ff9a68bf197e0669d073390N.exe 86 PID 4732 wrote to memory of 1452 4732 744335901ff9a68bf197e0669d073390N.exe 86 PID 4732 wrote to memory of 1452 4732 744335901ff9a68bf197e0669d073390N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\744335901ff9a68bf197e0669d073390N.exe"C:\Users\Admin\AppData\Local\Temp\744335901ff9a68bf197e0669d073390N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\AE60.tmp"C:\Users\Admin\AppData\Local\Temp\AE60.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD51e4b00c7ef35883e93d7daed03c771c6
SHA1965d4e003157c598ef1ce34d1baaf200ce4d52b6
SHA2569d22ed50510515b13113aeb03b7c27eb9ffd42cbc63e30d5ef628b2025e13961
SHA512fdbb34a52e7ef167e9dd3b7d0e46c7e24dcf2c9eb34183160c4ab8f319b4e1d6f31b5b096f6a2b0d149928d438ae9a0a4c2105cd377da307a1f1e976450d1068