Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 03:48
Behavioral task
behavioral1
Sample
cb4c79bfea7b34b2e773f99d4b7f4fae0d691de1844c42b617e3fd189132b68eN.exe
Resource
win7-20240903-en
General
-
Target
cb4c79bfea7b34b2e773f99d4b7f4fae0d691de1844c42b617e3fd189132b68eN.exe
-
Size
83KB
-
MD5
0b3d8bd6c3258553e97b7a00a54df910
-
SHA1
8a2d0475b51804ae8cd1272b94e86414cf49c29b
-
SHA256
cb4c79bfea7b34b2e773f99d4b7f4fae0d691de1844c42b617e3fd189132b68e
-
SHA512
65a8cb49d390dd91a6f0023a5ee8615f931ac1a7143f58490acfc90d15a933b06f6441019187ee2201dd5b160646950756a53f2056c30e33f525651997eb58f2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+YK:LJ0TAz6Mte4A+aaZx8EnCGVuY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/180-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/180-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/180-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/180-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234e1-11.dat upx behavioral2/memory/180-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/180-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb4c79bfea7b34b2e773f99d4b7f4fae0d691de1844c42b617e3fd189132b68eN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD572f7e829a3ca34788673ae3844c4cb21
SHA191319be2d6e6984f7fc369725a4a4f7449c8aacd
SHA256684d02addd84e4423a18f96aca36dbe9ab484f6bf6106ac8550d163a785f3e32
SHA5120f5c43a8ce5e2ed55029476341af52cc6390b03eda5ddb7a66c9996bfd8eb6de4c08605286f71ac01bf9d56b86725b2b0d9adf792872ad5e5a289580458d1018