Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 09:19
Behavioral task
behavioral1
Sample
f5675e90fd9b3177fd157e712773a65f07adf08d7b442e7654e0a98fa2037fe6N.exe
Resource
win7-20240903-en
General
-
Target
f5675e90fd9b3177fd157e712773a65f07adf08d7b442e7654e0a98fa2037fe6N.exe
-
Size
83KB
-
MD5
531a824a2c8d1be4c846ac6f2bb16910
-
SHA1
4b94fa7b1c0ef8234f95474ebbad62201d5dcb90
-
SHA256
f5675e90fd9b3177fd157e712773a65f07adf08d7b442e7654e0a98fa2037fe6
-
SHA512
e953ffa4473612ec2230497c3f650fe422880affc5f97b8a47121580761657508dc9d33ab28a689593fe374caaaf836eabb7382569784912d2eb8a2420f3ece3
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+pK:LJ0TAz6Mte4A+aaZx8EnCGVup
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4492-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4492-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4492-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4492-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023421-12.dat upx behavioral2/memory/4492-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4492-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5675e90fd9b3177fd157e712773a65f07adf08d7b442e7654e0a98fa2037fe6N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5b426df13b6591eb35406c17989a62c46
SHA179cf1d2879ae8e4724fb0cb1a7d7e73f5612668a
SHA256b92b61011a45df26cc58d0a528afa6be57ba173c8a1ef84c01778e6a0b916263
SHA51211bfabae3202ffa710b76dd534d371e308677cde8fe7d7336ddc5a09966720727c73d60047cc32ba371af2a1c51091dc75c5864954f592bca53b7a28a0205162