Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 09:00

General

  • Target

    $PLUGINSDIR/bomgar-scc.exe

  • Size

    763KB

  • MD5

    043cac1683f5cab7d079925a4b8a0fed

  • SHA1

    509ee93fcee9b59e6d383f30e55e52f88747e9b8

  • SHA256

    25eae86c681f75d42985aa9d9ebc097167354bfb81419abc686c24492eadf211

  • SHA512

    f1d4fb37f9866f6ca21622e6a0bf1c9993595bcc9480b91f80714d88fdc715ceb214403b53e427b237a61ca07891e8a7cf468b27551b68eb3583a20447d953d2

  • SSDEEP

    12288:V7a27+406MfKJ+VyiDcbPS92LDhMpwphkfPGoCBLrlTbyP/hca9H0eA5VkWbIOj:37+4w/IgcbPDDphkuBLcHhF9H0RkWbIi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\bomgar-scc.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\bomgar-scc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\settings.ini

    Filesize

    54B

    MD5

    1ac1c78bd1edd689a9ee729a5da64986

    SHA1

    fef32e8d12e2dc3eb849e2295e923473f6534df7

    SHA256

    283d1698bba02f1487d1e5e982309a61d5ecc5786f603e0eb4c2db9d57f9fb11

    SHA512

    f908b55d6a8fd5c0843c461b5d783e785627653815a48e2ab7329572cff25e75149c4b82a7d3473631e4240c646f5435638ad2cb218d6b51ef96f9a84ba99e52

  • memory/2324-154-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-1-0x0000000000810000-0x0000000000812000-memory.dmp

    Filesize

    8KB

  • memory/2324-19-0x00000000035C0000-0x00000000035C1000-memory.dmp

    Filesize

    4KB

  • memory/2324-43-0x0000000000810000-0x0000000000812000-memory.dmp

    Filesize

    8KB

  • memory/2324-45-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-48-0x00000000035C0000-0x00000000035C1000-memory.dmp

    Filesize

    4KB

  • memory/2324-73-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-100-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-0-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-127-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-234-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-208-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-181-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-236-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-263-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-290-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-317-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-344-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-371-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/2324-398-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB