Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe
Resource
win10v2004-20240802-en
General
-
Target
9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe
-
Size
79KB
-
MD5
30c4891d202675a788d675ab1e1864e0
-
SHA1
6cc9dd73cf42197d30b9ddc52dfe5b3872d0f11e
-
SHA256
9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9a
-
SHA512
7c058f2b68d39489b3d2bcfaee235f98d9a6acf96bb4960e38508c28b5e609d1a614cb7fe9b18fc1344fe28927b1ae5553984fd8dabf28789908c610be8e91b1
-
SSDEEP
1536:zvvSjrPgawlHWzMLP0OOQA8AkqUhMb2nuy5wgIP0CSJ+5yKB8GMGlZ5G:zvvSj8aKHWgLP0bGdqU7uy5w9WMyKN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 820 [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1724 1376 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe 82 PID 1376 wrote to memory of 1724 1376 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe 82 PID 1376 wrote to memory of 1724 1376 9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe 82 PID 1724 wrote to memory of 820 1724 cmd.exe 83 PID 1724 wrote to memory of 820 1724 cmd.exe 83 PID 1724 wrote to memory of 820 1724 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe"C:\Users\Admin\AppData\Local\Temp\9f94aec437c2ba9aa60aab18ffeac7dab6e2a6ffde3761a6804119b03dd57c9aN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5688402dba1b66d1831306fd3f69750b5
SHA1542e95b8aa52a5d1a4f2808e153045744334d293
SHA2569d52a83f8e2d303ce2b2e316125f05157f844c641b075773ae7662bdbc833ebc
SHA512983023a36a6024c30820681f8bf5df7eca2bc65666a8698622dce0a02b4019c5001d65057e92e8e76f8b154cbd013916d57431017eb42ba444823b15c4c394ed