Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 21:30
Behavioral task
behavioral1
Sample
8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe
Resource
win7-20240903-en
General
-
Target
8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe
-
Size
1.5MB
-
MD5
bbf324cf9353b82eb282bd2b0625e34c
-
SHA1
ef394b771769bd7295883401dcd9b164e532620e
-
SHA256
8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf
-
SHA512
92324726689989f1504dcbe6d6cf0518dba150737640807c0e7129c1f01b8b5342e204124adaea582cb0aef3ba0793642b1f99229dc808d3b193930b72d53801
-
SSDEEP
24576:SDEDdEI1e2Xdfft20f60XnWUoiH+bP+vPFOWP8bUszsqFLH0Wv+2Iap:yEDeI1euXu0X5VNXkbU1q50Wlp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
resource yara_rule behavioral2/memory/4036-0-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-9-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-11-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-16-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-17-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-20-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-22-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-23-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-24-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-27-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-28-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-29-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-30-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-31-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-32-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-33-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-34-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-35-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-36-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-37-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-38-0x0000000000400000-0x0000000000A9B200-memory.dmp upx behavioral2/memory/4036-39-0x0000000000400000-0x0000000000A9B200-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe 4036 8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe"C:\Users\Admin\AppData\Local\Temp\8e26be56f971d31843b90599758bf1b9e743cd0b397bddb40546a757e7e633cf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD55422f308a00ed47e7313754571477235
SHA167bef4e0d0f6fcc68f566e3dd6965ce85961fe8d
SHA256d9be36c3398d3950e06b3044d521e5b2d852924467b11aebd2f7c85bba664f55
SHA512523369f7ed43887d634dc4750ee824cb051710afdedf49cb6443cada7ad00cf6c797302d1184eaef3b4806b5455ad128444013e8090ebba98bc86c15469950ca
-
Filesize
724KB
MD5a96fbd5e66b31f3d816ad80f623e9bd9
SHA14eda42260bd3eb930cd4eafd7d15c6af367bcf18
SHA2562e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3
SHA51243921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e