Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    291s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 15:48

General

  • Target

    libusbK-3.1.0.0-setup-debug.exe

  • Size

    8.1MB

  • MD5

    2b633874de9f173c45b4782ce9a30998

  • SHA1

    809a1f303f25bb13866350a55e9e26378f9b2af4

  • SHA256

    5271ca2b083f11fa359740d3c712fda868f90b6becd308a4e89d9ba103a03cc6

  • SHA512

    e2467140d27de5f595bb6bca7dbdd679cf5549f8ef07f080dbe209a48161ecef4a58bc2fd60c043da2da0309fa319bbe17833bdd31dc7f9344807456c8f8090b

  • SSDEEP

    196608:gBnxBt7J7P76jwXzQ+bargIltIAUGU2mrrTl/NC1TdyFlv+9lB:GxJU+lygIIKmPTRgNdyi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\libusbK-3.1.0.0-setup-debug.exe
    "C:\Users\Admin\AppData\Local\Temp\libusbK-3.1.0.0-setup-debug.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Users\Admin\AppData\Local\Temp\is-B3EH7.tmp\libusbK-3.1.0.0-setup-debug.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-B3EH7.tmp\libusbK-3.1.0.0-setup-debug.tmp" /SL5="$902C2,8231457,58368,C:\Users\Admin\AppData\Local\Temp\libusbK-3.1.0.0-setup-debug.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-B3EH7.tmp\libusbK-3.1.0.0-setup-debug.tmp

    Filesize

    702KB

    MD5

    1afbd25db5c9a90fe05309f7c4fbcf09

    SHA1

    baf330b5c249ca925b4ea19a52fe8b2c27e547fa

    SHA256

    3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

    SHA512

    3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

  • memory/3088-2-0x0000000000401000-0x000000000040C000-memory.dmp

    Filesize

    44KB

  • memory/3088-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3088-8-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4588-6-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/4588-9-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB