Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 00:47
Behavioral task
behavioral1
Sample
9b9451836b9d1d09d728cab7aa714ca7cf7a4484d821585e0e915b6d5c5e1e49N.exe
Resource
win7-20240708-en
General
-
Target
9b9451836b9d1d09d728cab7aa714ca7cf7a4484d821585e0e915b6d5c5e1e49N.exe
-
Size
83KB
-
MD5
cdff8a278fa719058f0ede21aae810b0
-
SHA1
0207a37aa44e5270ef4ef74d896c896221871bd6
-
SHA256
9b9451836b9d1d09d728cab7aa714ca7cf7a4484d821585e0e915b6d5c5e1e49
-
SHA512
d5fead45f6f6039dbc60986de9e36c38a878f658d71208d45c2b3ce366391bf42b7db8cd0f47a6007773e74923e3a4ae6cb5af8b2ec975f355142897babd6a93
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+aK:LJ0TAz6Mte4A+aaZx8EnCGVua
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3676-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3676-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3676-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023469-12.dat upx behavioral2/memory/3676-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3676-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b9451836b9d1d09d728cab7aa714ca7cf7a4484d821585e0e915b6d5c5e1e49N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5724682c3796d0f6e411652b538228c69
SHA1eba6e39c88c6ff7f293de0a016ed2cf180e43c08
SHA256a596eac3d131b06c1bc65caf0d4b1af4722173a22fa5bac6cfcb6804ad0e3c1a
SHA512c55203b548d643e53ebf521e73f0e7dc2028b93fa2cc362abc4e8fbaf5a0f53d13ca9135b02eb3569be6738dbdb4ced8eaf4cf718532cccf4c37ab42e075839d