Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 13:50
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.6MB
-
MD5
3d6cf2933284333f5d945c062bffcd2b
-
SHA1
deb8e888fcea2139a0f91a7a87386c086b71b134
-
SHA256
b3058d02ea8c370311e612bd4916e05c8c909b110d3f2c588073c59b2105dba5
-
SHA512
2fc2aa55e05740eba7c8de7c686071a6d6f47a0997d722408c902dce860948e5fc5cbf4e94b788c22120336b00adec58582b4c6f5d6439f6b54da77839351cb0
-
SSDEEP
49152:Zc2/wgEeoVOwjL4aCd/JajeU8PrbS6rgSvkW:CgEdIi4p/J60d
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3564-0-0x0000000000400000-0x0000000000669000-memory.dmp upx behavioral2/memory/3564-17-0x0000000000400000-0x0000000000669000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3564 wrote to memory of 5048 3564 file.exe 84 PID 3564 wrote to memory of 5048 3564 file.exe 84 PID 5048 wrote to memory of 3636 5048 cmd.exe 86 PID 5048 wrote to memory of 3636 5048 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\Admin\AppData\Local\Temp\PID8.vbs)>>C:\Users\Admin\AppData\Local\Temp\kms.log2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\cscript.execscript.exe /nologo C:\Users\Admin\AppData\Local\Temp\PID8.vbs3⤵PID:3636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701B
MD58f897597aa1e32838a195601f5213ad3
SHA13247d3155d993ed64b8f6f1e314aad86e63902d2
SHA256c1a3cbbf06f6a29a65415094acabbb0430d9c8dc64c273aaab4373b11f1ecec5
SHA512e666c85f7760c0f6a2f5726461d4dae38f75f9b947fba80a51abe11637e484f3016b1afecba08cf43dc16742c6fa19051f6821a3fe47e3a2fc9c26e1f2eb7675
-
Filesize
2KB
MD578d143bc6c1968d0a228b29e823d051e
SHA1a11dfa069c0b49487f55b32e8e9e89fad3796b5b
SHA256dca511dfdbaadbad34a89f0fa4c86de1a8a37fedc326f7bc17a746d44b0fbaff
SHA512af82ab5a8855576f0f29a681b07befd456ebca7e381e8c902e9151ceabf6c59035d02ead07fc98b2e601ea11746887664acee73f39ee2c029685289f9c519068
-
Filesize
35B
MD57fe0b758af0207e3dae31e0618c54afb
SHA164de9a12c49e7c810adb5af08ae83e10fb2362df
SHA2568fb528281a0893afe0333cfa06673559658d046ef7bde09e83aeebc2126e0e29
SHA512b1811b3e976dd3a28faf2ef33d9b48b1572bc1aed3ce6ec2f7c9d21f337f4336836d48a7b5f049f64a7bc80b19015d4b41fb24d731f4310359796459ab0de04a