Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 09:16

General

  • Target

    cvery.comc345785355/Setup/MetaDraw_3_1_Install.exe

  • Size

    5.2MB

  • MD5

    26c60e579a96d284997ea4e569d880e4

  • SHA1

    d92d989a1be593cb2e42d4538896a789d70632f1

  • SHA256

    fe5a7add2800029ad3d4b004fc6e9ce4470cde1b8db9315edd03ade0c7d8787f

  • SHA512

    65ccb14f32eb15e29f72d7fb34ca47f46a88ee7b3bc27e5ff4b5965b3062bb95e15212f4dc799da210830e77446dba711b38db15ecd8139446bc7423aa7020ca

  • SSDEEP

    98304:LdxU7ayy0lejrbmDsa0oA+nrUBrBazvGdGpCM3pg/aGX5wv4Mk42fEwuPuii:SayJQjvmDL07+rUBN9K2/RHutGii

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cvery.comc345785355\Setup\MetaDraw_3_1_Install.exe
    "C:\Users\Admin\AppData\Local\Temp\cvery.comc345785355\Setup\MetaDraw_3_1_Install.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:3084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GLKA3D2.tmp

    Filesize

    30KB

    MD5

    80af8dd09484fd57ee8c1b6c5c6267bd

    SHA1

    cd84fb24b823cf113e53a6b31b6cec6aea01745f

    SHA256

    1d079cf4785ee638ba466ecccd6776d327bc3abbfbc07ce04aecbcba1406f3f3

    SHA512

    8c160949b28115ec951084729280e6d7976df4ab96b6057b37bbe981518742c4b45474c8219743d9338ebf080fecc33779f13c899be9495f46dde37979fe3bb6

  • C:\Windows\~GLC0000.TMP

    Filesize

    151KB

    MD5

    d48743b006496864f88f56719432fe26

    SHA1

    00af8dc54ab5617f72367d3c85336c9085f52744

    SHA256

    68ae6a552c63f331586d27930b4dcb3da63a88a86e1928cf078ccc7769e4970f

    SHA512

    104f91188d7fc6c314d45083b0c97b38c8207a1c63589ad134c9b854319f1dd2075435c1d104f3e85460245b4ee1b2cfaa9e231824c846709c160173585e30fa

  • C:\Windows\~GLH0000.TMP

    Filesize

    26KB

    MD5

    89cf6af0a2a1cfebc82851c20852c121

    SHA1

    9106f4ade6a696d5f98968bce895333ad5dbd9ae

    SHA256

    94ef91b4c7864bd1ecc0db099e58298708bc5d22da40132ebb1c17feb4675964

    SHA512

    af4a484b9bb8850c29fbfee1784b3cd3f78e6cbb419ad49262c28be16b31b5e1b43328c3088ae83f202ad2941062fa94325d77078f5c8e07a11a3fea1b56d627

  • memory/3084-19-0x000000005F000000-0x000000005F011000-memory.dmp

    Filesize

    68KB