Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
PI 30_08_2024.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PI 30_08_2024.exe
Resource
win10v2004-20240802-en
General
-
Target
PI 30_08_2024.exe
-
Size
1.6MB
-
MD5
cdcd175b7d8c57d70cbe8dde6b38a25a
-
SHA1
3e3973d10df79619d422d3a306d8ccf534624770
-
SHA256
a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84
-
SHA512
18ada249a31c2a38f41659d90be5ebad253ad7a89ebb1b7f4370210f59e64d808733058ca58c051a72ab6722f8380586108db586ad1707ad2ee284364268aa8a
-
SSDEEP
24576:WqDEvCTbMWu7rQYlBQcBiT6rprG8acthteEkaQzmq0/z11U3Ncu:WTvC/MTQYxsWR7aSAEL1UG
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 3020 2732 PI 30_08_2024.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PI 30_08_2024.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe 3020 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2732 PI 30_08_2024.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2732 PI 30_08_2024.exe 2732 PI 30_08_2024.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2732 PI 30_08_2024.exe 2732 PI 30_08_2024.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3020 2732 PI 30_08_2024.exe 89 PID 2732 wrote to memory of 3020 2732 PI 30_08_2024.exe 89 PID 2732 wrote to memory of 3020 2732 PI 30_08_2024.exe 89 PID 2732 wrote to memory of 3020 2732 PI 30_08_2024.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\PI 30_08_2024.exe"C:\Users\Admin\AppData\Local\Temp\PI 30_08_2024.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PI 30_08_2024.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD556b96c8d4c091c81d9a1cb8421829a72
SHA143aee96efb0acc54e9d89d084dacaffa7350dcd5
SHA25635acbabbac54562f9c6b4cf86229fc259b1f8c818c96f1adedac7482566b723d
SHA51270550d1fb91a7fb93eed6980cfdac6c4cc6a7f1a6bf6a76856bdc14ff0a5fc3247821009fc645cc292fdbb346b79c199f7f9740a94a7a37427c521db81032375