Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
Sworda.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Sworda.exe
Resource
win10v2004-20240802-en
General
-
Target
Sworda.exe
-
Size
219KB
-
MD5
bcf6a2641a6cce6b590c8f8c401361c1
-
SHA1
26e0470792d26b100ad51bc3ba1eff0538ec1f39
-
SHA256
d97657a88609ddf77c5fd1b21ace96ab086ca4c1d68074dd837ec310071d02b9
-
SHA512
fd1e25e95f3efe6e23476e92cda9019080c09732e2ead803c3b938de380df652b6603adb978dfeedffdc60fad427626b9e05de11ce5f0edadd65f797806749c2
-
SSDEEP
6144:qPS46wHhuYoBu+oshaiI/Kv+Zx+NelROCUKA:qPSyBuY5ohC/fZx+NeDC9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3708 Sworda.TMP0 -
Loads dropped DLL 1 IoCs
pid Process 64 Sworda.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sworda.TMP0 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sworda.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\WOW6432Node\CLSID Sworda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2DB5E62B-0D67-495F-8F9D-C2F0188647AC} Sworda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node Sworda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID Sworda.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 64 wrote to memory of 3708 64 Sworda.exe 83 PID 64 wrote to memory of 3708 64 Sworda.exe 83 PID 64 wrote to memory of 3708 64 Sworda.exe 83 PID 64 wrote to memory of 3708 64 Sworda.exe 83 PID 64 wrote to memory of 3708 64 Sworda.exe 83 PID 64 wrote to memory of 3708 64 Sworda.exe 83 PID 64 wrote to memory of 3708 64 Sworda.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sworda.exe"C:\Users\Admin\AppData\Local\Temp\Sworda.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\Sworda.TMP0"C:\Users\Admin\AppData\Local\Temp\Sworda.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e99a5f2bf65521137b0276146c2b493a
SHA18668f6adc2613bcd8b1403779a707466d4cc6174
SHA256c000978738a9c544fd3d2689bc8017dd42fdbf9428ae9183c8742baf34dd96c4
SHA512ddbbc88546f522f3d99f296ac4fb1fdd72e7f6604081ab17f0f16e065f69db01dd2f7b7d249904737d386db6006123dde2965234e36a497cd48394d13b4e758f
-
Filesize
248KB
MD544c4d39c5f458f133f3a807673866d52
SHA107b09c79dc32184364f31e47775770cf035570fd
SHA256f688c94c5fe31a8b8c93d22da896d090f227544dae16e47ff0fcf621ed15c7d4
SHA51285cdee0a75c78861858f57409ccd7c699b666ef8d6b90019e6e157dc860013de015323608407d32f24dd54215998881979f34fc0d78ceecdb5a1f4c33d7f5ee8