Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 14:09

General

  • Target

    c6ae6cee842c6c70865f2c8b00a8faa0N.exe

  • Size

    4.4MB

  • MD5

    c6ae6cee842c6c70865f2c8b00a8faa0

  • SHA1

    eddab94d7403bbf9a2183861788e1a441ffc75eb

  • SHA256

    e83e61152c7dbaeab7b506a8b6efca7b610a4de6f2566bed01900c95dc74d1c1

  • SHA512

    11eaf66953f8f87978ef613bf3de5b5107c794a2a977468f167d644469e4da34f722a868301b7689d72996cbab59a30a718263d14dc1b0ef29f786288a8e3ac0

  • SSDEEP

    98304:emhd1Urye32TfQpiAw6niRU3pcZl/SV7wQqZUha5jtSn:elX2TfQpiAw6n2U3p52QbaZte

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6ae6cee842c6c70865f2c8b00a8faa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c6ae6cee842c6c70865f2c8b00a8faa0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Users\Admin\AppData\Local\Temp\430F.tmp
      "C:\Users\Admin\AppData\Local\Temp\430F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c6ae6cee842c6c70865f2c8b00a8faa0N.exe 6982A06090E0298DC75B910BA13FF1055B749ACCDD610395EBDECC190F46F3BC8025904F4713CCCA2288692CAF67CD7603533D0D19A0D2F78B3CFD325CA47F76
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1012
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=3904 /prefetch:8
    1⤵
      PID:1752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\430F.tmp

      Filesize

      4.4MB

      MD5

      a8183fbe7bbc6b5ce39b57f475c5183a

      SHA1

      e669f35ce87b29732081cb1ee77f21b7508f6652

      SHA256

      49e34b2e1baf6d409a37065b4136b413c4c1e0c76abbc868728c2d164dfde0dd

      SHA512

      37054bbfd0e5c712f3a30aecd7fe7417e3ff3686e0596ef97cac007c4ce0dc1762deff700f5ce89b3ac02e823add6229966e2ae4ec43bea17b7e90bb5efb03bd

    • memory/1012-5-0x0000000000400000-0x0000000000849000-memory.dmp

      Filesize

      4.3MB

    • memory/4864-0-0x0000000000400000-0x0000000000849000-memory.dmp

      Filesize

      4.3MB