Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
c9a5d547eb80e22c8766665887579f00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c9a5d547eb80e22c8766665887579f00N.exe
Resource
win10v2004-20240802-en
General
-
Target
c9a5d547eb80e22c8766665887579f00N.exe
-
Size
476KB
-
MD5
c9a5d547eb80e22c8766665887579f00
-
SHA1
b3b6367b30f4fe3974cd80339ed964a50df96b55
-
SHA256
b4743ef66cbd4a3a356ee815641ce83d6d36b0e5f0785b37d870724d03008642
-
SHA512
26421570877700ec61d4443b0565ee0c12fae7bc1c12ae167e68fad4f12c123f68b71622d0f259961b737c40192b520001514a9f8927867d72754720553f8679
-
SSDEEP
3072:01xXwSmJQMva8zFki2kXbcvpoADapZgIZuwRGbCU/P1eEp4Zm8q4Ou72/QLQbkOj:HJZv5zFiIOIgI2Jf8C/QLQbkODGC
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9a5d547eb80e22c8766665887579f00N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85 PID 2796 wrote to memory of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85 PID 2796 wrote to memory of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85 PID 2796 wrote to memory of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85 PID 2796 wrote to memory of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85 PID 2796 wrote to memory of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85 PID 2796 wrote to memory of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85 PID 2796 wrote to memory of 3492 2796 c9a5d547eb80e22c8766665887579f00N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9a5d547eb80e22c8766665887579f00N.exe"C:\Users\Admin\AppData\Local\Temp\c9a5d547eb80e22c8766665887579f00N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\c9a5d547eb80e22c8766665887579f00N.exe"C:\Users\Admin\AppData\Local\Temp\c9a5d547eb80e22c8766665887579f00N.exe"2⤵PID:3492
-