Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 08:01

General

  • Target

    startup.exe

  • Size

    90KB

  • MD5

    9920d94fc66768b99333325a5bab417f

  • SHA1

    4d5482ca9400e315a5200aff0b672e02246a505c

  • SHA256

    07bd47166dda089e1554eec3141fdd20baf6236b03496e57032a23f080893e2b

  • SHA512

    33007cb7fc34b43fad3372ccbe33fe6bf6190df0e7b6b8313c2cd2c028dc6978d4506620fa09b40b11997dd40422afc3f0af021e0a66c6e5f65012b0c4ded5d3

  • SSDEEP

    1536:DP7ftfkS5g9YOms+gZcQipICdXkNDqLLZX9lItVGL++eIOlnToIfyweXtgOX:DjFfHgTWmCRkGbKGLeNTBfyt5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\startup.exe
    "C:\Users\Admin\AppData\Local\Temp\startup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6C85.tmp\6C86.tmp\6C87.bat C:\Users\Admin\AppData\Local\Temp\startup.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1132
      • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe
        javaw -Djava.net.preferIPv4Stack=false -Xms128m -Xmx512m -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=./ -cp "../app/lib/*;../app/lib/undertow/*" -noverify -Dframework=DCP -Dservice=LocalAutoExecutor -Dspring.jmx.enabled=false -XX:TieredStopAtLevel=1 -Drpc.introspection.checking=true -Dco.paralleluniverse.fibers.verifyInstrumentation=true -Dspring.config.location=application.yaml -Dspring.main.web-environment=true -Dserver.service=service.yaml com.huawei.dcp.springframework.springboot.Main
        3⤵
          PID:4444

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6C85.tmp\6C86.tmp\6C87.bat

      Filesize

      1KB

      MD5

      6fff0f25b1f097e77fa3cc3baef782be

      SHA1

      a5b3f62a5e31bae2649efb882a81cfd1a0f786a3

      SHA256

      365dcf49f7f01f038f371fe69342965d9a9ae288017b8eea3cd8b9cb90f4d3de

      SHA512

      121b1d335f3826f9f128fbf952837a49b3103183a391ac9c8479e5e02a7fa315b608f97e7594414f4364dc228dbc4004a2de4711f94bb2749f7c5f38b28d1eea

    • memory/4444-4-0x000001ECBFE20000-0x000001ECC0090000-memory.dmp

      Filesize

      2.4MB

    • memory/4444-13-0x000001ECBFE00000-0x000001ECBFE01000-memory.dmp

      Filesize

      4KB

    • memory/4444-14-0x000001ECBFE20000-0x000001ECC0090000-memory.dmp

      Filesize

      2.4MB