Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
c6ae6cee842c6c70865f2c8b00a8faa0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c6ae6cee842c6c70865f2c8b00a8faa0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c6ae6cee842c6c70865f2c8b00a8faa0N.exe
-
Size
4.4MB
-
MD5
c6ae6cee842c6c70865f2c8b00a8faa0
-
SHA1
eddab94d7403bbf9a2183861788e1a441ffc75eb
-
SHA256
e83e61152c7dbaeab7b506a8b6efca7b610a4de6f2566bed01900c95dc74d1c1
-
SHA512
11eaf66953f8f87978ef613bf3de5b5107c794a2a977468f167d644469e4da34f722a868301b7689d72996cbab59a30a718263d14dc1b0ef29f786288a8e3ac0
-
SSDEEP
98304:emhd1Urye32TfQpiAw6niRU3pcZl/SV7wQqZUha5jtSn:elX2TfQpiAw6n2U3p52QbaZte
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1012 430F.tmp -
Executes dropped EXE 1 IoCs
pid Process 1012 430F.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 430F.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6ae6cee842c6c70865f2c8b00a8faa0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1012 4864 c6ae6cee842c6c70865f2c8b00a8faa0N.exe 92 PID 4864 wrote to memory of 1012 4864 c6ae6cee842c6c70865f2c8b00a8faa0N.exe 92 PID 4864 wrote to memory of 1012 4864 c6ae6cee842c6c70865f2c8b00a8faa0N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6ae6cee842c6c70865f2c8b00a8faa0N.exe"C:\Users\Admin\AppData\Local\Temp\c6ae6cee842c6c70865f2c8b00a8faa0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\430F.tmp"C:\Users\Admin\AppData\Local\Temp\430F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c6ae6cee842c6c70865f2c8b00a8faa0N.exe 6982A06090E0298DC75B910BA13FF1055B749ACCDD610395EBDECC190F46F3BC8025904F4713CCCA2288692CAF67CD7603533D0D19A0D2F78B3CFD325CA47F762⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=3904 /prefetch:81⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5a8183fbe7bbc6b5ce39b57f475c5183a
SHA1e669f35ce87b29732081cb1ee77f21b7508f6652
SHA25649e34b2e1baf6d409a37065b4136b413c4c1e0c76abbc868728c2d164dfde0dd
SHA51237054bbfd0e5c712f3a30aecd7fe7417e3ff3686e0596ef97cac007c4ce0dc1762deff700f5ce89b3ac02e823add6229966e2ae4ec43bea17b7e90bb5efb03bd