Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 21:03
Behavioral task
behavioral1
Sample
7cbaad3ecb2cb27ac92cd880f7a89b8b5cbaa5c4f6e73ef1b2e221114270fc58N.exe
Resource
win7-20240903-en
General
-
Target
7cbaad3ecb2cb27ac92cd880f7a89b8b5cbaa5c4f6e73ef1b2e221114270fc58N.exe
-
Size
83KB
-
MD5
c970930b0516d5aad3ba047bd5639480
-
SHA1
55afa94ab238be896178bc63df1f1064ac252eb2
-
SHA256
7cbaad3ecb2cb27ac92cd880f7a89b8b5cbaa5c4f6e73ef1b2e221114270fc58
-
SHA512
ce2816c4544d00d12ad0dab358ea09471d09e9e3f6f39034376dee2bddb61a9680f8ed079c045f4c3384d135e2e643392238da9f1e41af5bff1265b7e77489d4
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K:LJ0TAz6Mte4A+aaZx8EnCGVu+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1156-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1156-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1156-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1156-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000800000002342a-12.dat upx behavioral2/memory/1156-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1156-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cbaad3ecb2cb27ac92cd880f7a89b8b5cbaa5c4f6e73ef1b2e221114270fc58N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58e02f7edb1da3854d0b2474d9b632113
SHA1beac8c9da1be560ad210e820c8c9fd0a895ed621
SHA2563c86fbe6d9e07879db9f4253d73efede222dfa1c4d712266689f449bdee46985
SHA512986beb9405ce5b86da1c725e3197a8e9632beccd46212ee2e2b3f7eb4b65aed2f8a6a70b9bda23be646d21b51b6d02d21be391bdba28e85e4adf5cacca80318f