Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1791s
  • max time network
    1158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 13:16

General

  • Target

    protanki-installer.exe

  • Size

    10.1MB

  • MD5

    a7e33432f3835d8c612abb8ddb6b2132

  • SHA1

    d6fdfd2d31dda3afea83720099a0dcaa7799d349

  • SHA256

    cb1f151404549c304e895282593e4d6ceea18f394eb062976a6275d28a4ac80a

  • SHA512

    bbdb47c23f4c14c552132c5d0d75015f9e9fb62ba924d15742225d4193f1fad4ce01ff012bff6a0b0153f630d332bbff5d1f9e9ea78f99e55a81b6cda1de2479

  • SSDEEP

    196608:eidEKjJtF2KejWZlOmjd8FMkBFTeSUbYbPjve81IBA3U:/VF2mlpdw/cbSes3U

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\protanki-installer.exe
    "C:\Users\Admin\AppData\Local\Temp\protanki-installer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\is-21FO4.tmp\protanki-installer.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-21FO4.tmp\protanki-installer.tmp" /SL5="$120042,9782872,883712,C:\Users\Admin\AppData\Local\Temp\protanki-installer.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-21FO4.tmp\protanki-installer.tmp

    Filesize

    3.1MB

    MD5

    feb289287fe90220dcbdb3ff8a5965f9

    SHA1

    56711df6eee0a99c2114be7ee62c67ced133ad9c

    SHA256

    0180039f29fe1b2982d318d3e6e381ac9ef76bb0cf61eabb2e7f8a921377c40c

    SHA512

    2a6321e76997dfbf3cf1afa9b725330b3c925aa5c91b123e3f44fdb163a8167c25a0b6ffd3289d1c3efd7f614e86e7ee84b6c8b5f50552aa1c574faba16038fe

  • memory/3052-0-0x0000000000400000-0x00000000004E5000-memory.dmp

    Filesize

    916KB

  • memory/3052-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/3052-8-0x0000000000400000-0x00000000004E5000-memory.dmp

    Filesize

    916KB

  • memory/3792-6-0x0000000000400000-0x0000000000720000-memory.dmp

    Filesize

    3.1MB

  • memory/3792-10-0x0000000000400000-0x0000000000720000-memory.dmp

    Filesize

    3.1MB