Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 02:40
Behavioral task
behavioral1
Sample
ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe
Resource
win7-20240903-en
General
-
Target
ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe
-
Size
3.1MB
-
MD5
5b14df1350d8d241bb877d62ecf6e5e4
-
SHA1
8ab517a645e3ebe488f9f8746979842eb6269f45
-
SHA256
ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06
-
SHA512
1c1de3b6fdafc7c0ab76e004ad718edc50d6501f3de090378e1170b6cfe289c7bfc0cd783befb964875b26fdf0e07ebe9c863c312a60fedbdcc9fcb4acaf1893
-
SSDEEP
98304:8eEX+w43esKEyt3elWtrilT8w6iJdD5+U7FhRZD+a:6Y3JKEy5eoWsiJdt+UJhRxT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3920-12-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-56-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-57-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-58-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-67-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-68-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-69-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-70-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-71-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect behavioral2/memory/3920-72-0x0000000000400000-0x0000000000B28000-memory.dmp vmprotect -
resource yara_rule behavioral2/memory/3920-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3920-13-0x0000000010000000-0x000000001003E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5356 RunDll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3920 wrote to memory of 5356 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 89 PID 3920 wrote to memory of 5356 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 89 PID 3920 wrote to memory of 5356 3920 ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe 89 PID 5356 wrote to memory of 1688 5356 RunDll32.exe 90 PID 5356 wrote to memory of 1688 5356 RunDll32.exe 90 PID 5356 wrote to memory of 1688 5356 RunDll32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe"C:\Users\Admin\AppData\Local\Temp\ae8565a2711ce09321047bbccd0131b06edf8b45dcf3d04ab8f94f39fd06bf06.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 02⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5356 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:0 WinX:0 WinY:0 IEFrame:000000003⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4300,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=3880 /prefetch:81⤵PID:2688