Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 13:50

General

  • Target

    file.exe

  • Size

    1.6MB

  • MD5

    3d6cf2933284333f5d945c062bffcd2b

  • SHA1

    deb8e888fcea2139a0f91a7a87386c086b71b134

  • SHA256

    b3058d02ea8c370311e612bd4916e05c8c909b110d3f2c588073c59b2105dba5

  • SHA512

    2fc2aa55e05740eba7c8de7c686071a6d6f47a0997d722408c902dce860948e5fc5cbf4e94b788c22120336b00adec58582b4c6f5d6439f6b54da77839351cb0

  • SSDEEP

    49152:Zc2/wgEeoVOwjL4aCd/JajeU8PrbS6rgSvkW:CgEdIi4p/J60d

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Windows\system32\cmd.exe
      C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\Admin\AppData\Local\Temp\PID8.vbs)>>C:\Users\Admin\AppData\Local\Temp\kms.log
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Windows\system32\cscript.exe
        cscript.exe /nologo C:\Users\Admin\AppData\Local\Temp\PID8.vbs
        3⤵
          PID:3636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\LIC_SWITCH.log

      Filesize

      701B

      MD5

      8f897597aa1e32838a195601f5213ad3

      SHA1

      3247d3155d993ed64b8f6f1e314aad86e63902d2

      SHA256

      c1a3cbbf06f6a29a65415094acabbb0430d9c8dc64c273aaab4373b11f1ecec5

      SHA512

      e666c85f7760c0f6a2f5726461d4dae38f75f9b947fba80a51abe11637e484f3016b1afecba08cf43dc16742c6fa19051f6821a3fe47e3a2fc9c26e1f2eb7675

    • C:\Users\Admin\AppData\Local\Temp\PID8.vbs

      Filesize

      2KB

      MD5

      78d143bc6c1968d0a228b29e823d051e

      SHA1

      a11dfa069c0b49487f55b32e8e9e89fad3796b5b

      SHA256

      dca511dfdbaadbad34a89f0fa4c86de1a8a37fedc326f7bc17a746d44b0fbaff

      SHA512

      af82ab5a8855576f0f29a681b07befd456ebca7e381e8c902e9151ceabf6c59035d02ead07fc98b2e601ea11746887664acee73f39ee2c029685289f9c519068

    • C:\Users\Admin\AppData\Local\Temp\kms.log

      Filesize

      35B

      MD5

      7fe0b758af0207e3dae31e0618c54afb

      SHA1

      64de9a12c49e7c810adb5af08ae83e10fb2362df

      SHA256

      8fb528281a0893afe0333cfa06673559658d046ef7bde09e83aeebc2126e0e29

      SHA512

      b1811b3e976dd3a28faf2ef33d9b48b1572bc1aed3ce6ec2f7c9d21f337f4336836d48a7b5f049f64a7bc80b19015d4b41fb24d731f4310359796459ab0de04a

    • memory/3564-0-0x0000000000400000-0x0000000000669000-memory.dmp

      Filesize

      2.4MB

    • memory/3564-17-0x0000000000400000-0x0000000000669000-memory.dmp

      Filesize

      2.4MB