Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 13:30

General

  • Target

    a0294fa61c072b5f8d3706f31d3a00319b07d2eb6e79b945d78b4c4e7ab7199eN.exe

  • Size

    73KB

  • MD5

    c7198f1c97ddf29a642a80d6cad8ab50

  • SHA1

    2c0809937d2c66ddfaefefc235bab0e04a7c87b5

  • SHA256

    a0294fa61c072b5f8d3706f31d3a00319b07d2eb6e79b945d78b4c4e7ab7199e

  • SHA512

    da908ed08f3fc6b2c8ae2a0a853b54f43cf722111b22b728a1ff58dc4ce7b84df075120b6f8333b4bd401b1fbcfb51f5c7070983f82a245c8ef3327a718966a1

  • SSDEEP

    1536:hbSYv9ZK5QPqfhVWbdsmA+RjPFLC+e5hy0ZGUGf2g:hGYvHNPqfcxA+HFshyOg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0294fa61c072b5f8d3706f31d3a00319b07d2eb6e79b945d78b4c4e7ab7199eN.exe
    "C:\Users\Admin\AppData\Local\Temp\a0294fa61c072b5f8d3706f31d3a00319b07d2eb6e79b945d78b4c4e7ab7199eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 00.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00.exe

    Filesize

    2KB

    MD5

    7b621943a35e7f39cf89f50cc48d7b94

    SHA1

    2858a28cf60f38025fffcd0ba2ecfec8511c197d

    SHA256

    bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991

    SHA512

    4169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1

  • memory/4596-3-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB