Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 22:23

General

  • Target

    Sworda.exe

  • Size

    219KB

  • MD5

    bcf6a2641a6cce6b590c8f8c401361c1

  • SHA1

    26e0470792d26b100ad51bc3ba1eff0538ec1f39

  • SHA256

    d97657a88609ddf77c5fd1b21ace96ab086ca4c1d68074dd837ec310071d02b9

  • SHA512

    fd1e25e95f3efe6e23476e92cda9019080c09732e2ead803c3b938de380df652b6603adb978dfeedffdc60fad427626b9e05de11ce5f0edadd65f797806749c2

  • SSDEEP

    6144:qPS46wHhuYoBu+oshaiI/Kv+Zx+NelROCUKA:qPSyBuY5ohC/fZx+NeDC9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Sworda.exe
    "C:\Users\Admin\AppData\Local\Temp\Sworda.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Users\Admin\AppData\Local\Temp\Sworda.TMP0
      "C:\Users\Admin\AppData\Local\Temp\Sworda.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ArmA7E8.tmp

    Filesize

    64KB

    MD5

    e99a5f2bf65521137b0276146c2b493a

    SHA1

    8668f6adc2613bcd8b1403779a707466d4cc6174

    SHA256

    c000978738a9c544fd3d2689bc8017dd42fdbf9428ae9183c8742baf34dd96c4

    SHA512

    ddbbc88546f522f3d99f296ac4fb1fdd72e7f6604081ab17f0f16e065f69db01dd2f7b7d249904737d386db6006123dde2965234e36a497cd48394d13b4e758f

  • C:\Users\Admin\AppData\Local\Temp\Sworda.TMP0

    Filesize

    248KB

    MD5

    44c4d39c5f458f133f3a807673866d52

    SHA1

    07b09c79dc32184364f31e47775770cf035570fd

    SHA256

    f688c94c5fe31a8b8c93d22da896d090f227544dae16e47ff0fcf621ed15c7d4

    SHA512

    85cdee0a75c78861858f57409ccd7c699b666ef8d6b90019e6e157dc860013de015323608407d32f24dd54215998881979f34fc0d78ceecdb5a1f4c33d7f5ee8