Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 18:28
Behavioral task
behavioral1
Sample
80d55cd24979c59fdfaf5c05648a27c74b50ad9373f0a61450f005c71debdc59N.exe
Resource
win7-20240708-en
General
-
Target
80d55cd24979c59fdfaf5c05648a27c74b50ad9373f0a61450f005c71debdc59N.exe
-
Size
83KB
-
MD5
5b29129f78bd1926edfae104fe6ba2a0
-
SHA1
b9c850e885d5575655af30d8935983501317f23d
-
SHA256
80d55cd24979c59fdfaf5c05648a27c74b50ad9373f0a61450f005c71debdc59
-
SHA512
e9e357b395b5205f037fc7ffc9f04d43001a075a9a654c7bbfc29484d2f3a14085942a9b00092fc5470fee0ffdbe24fd5493a66074ae2aeabac0d72867972217
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+QK:LJ0TAz6Mte4A+aaZx8EnCGVuQ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4832-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4832-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4832-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4832-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234fe-11.dat upx behavioral2/memory/4832-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4832-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80d55cd24979c59fdfaf5c05648a27c74b50ad9373f0a61450f005c71debdc59N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5ac91de7437a4477dd4e5ae5a822402ed
SHA191b355d53858f96f5c63f4be9d7b99909404fefd
SHA2565f00db62cdd65d7ae5c5b1c6ad6b88d267bd9e816fad366cfe3e43a68edaf08d
SHA51291236e4cd53f7f20c8898ebfdea4a511c41b94748804fcb94774a66bfcc375d9ed4aec28cc18594e65ac4d8503855b6baf09d15c6308d46e21f553cc4d170074