Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
566469cb309844b858c29dbf525e99f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
566469cb309844b858c29dbf525e99f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
566469cb309844b858c29dbf525e99f0N.exe
-
Size
7.0MB
-
MD5
566469cb309844b858c29dbf525e99f0
-
SHA1
0930a6416ae1842872520fe5a28adc47fed123ff
-
SHA256
9bd785a2b6995a69bb0db1b71aa8af64e4fa5d03a1a2458591226e68cb0358ce
-
SHA512
bf1aa25be3d1247b4b5ca1d109afe24b2d3ff7cef7cc526c44440da943e6d0b1d0dde9bcb4e9f7eeb5a177d02c7f453a5ebcf6137467b68e2576fe21f76065e6
-
SSDEEP
98304:emhd1Uryesp3K2GJwod4XFFV7wQqZUha5jtSyZIUbn:elQaPiF1F2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5000 CC58.tmp -
Executes dropped EXE 1 IoCs
pid Process 5000 CC58.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CC58.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 566469cb309844b858c29dbf525e99f0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1532 wrote to memory of 5000 1532 566469cb309844b858c29dbf525e99f0N.exe 86 PID 1532 wrote to memory of 5000 1532 566469cb309844b858c29dbf525e99f0N.exe 86 PID 1532 wrote to memory of 5000 1532 566469cb309844b858c29dbf525e99f0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\566469cb309844b858c29dbf525e99f0N.exe"C:\Users\Admin\AppData\Local\Temp\566469cb309844b858c29dbf525e99f0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\CC58.tmp"C:\Users\Admin\AppData\Local\Temp\CC58.tmp" --splashC:\Users\Admin\AppData\Local\Temp\566469cb309844b858c29dbf525e99f0N.exe BA047AC9FAF85F134795299E0BFCFE005617C05926628C25B5D4B6FD4D2C5057EBA791BBAB174CB11BD756E2B733E8B2CCE3626F48580C53742B0A141D39A20D2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD570da038e988ace2ac94df080f28dd46a
SHA1ab63f9ec341b6b549d5e3eed5b5cafd6a7668093
SHA256c7eef59499ab178d784601adbbf29cb0b3d0ac524ef63fbf2a19b41abbf112c4
SHA5121f014f17f7b2dcf13f1e78335c8c4648eaeab4a5a6e46408eacbce66e6c0a331b76bb0afd9786332aa593263ef50cb167345a8272c31ea2b09d6ec0134dd93ad