Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe
Resource
win10v2004-20240802-en
General
-
Target
3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe
-
Size
1.4MB
-
MD5
73fcdf8831ea7c428661e2b1b8c36c5d
-
SHA1
c49ad3fea592346ade57a876a1d54ca5387c85b6
-
SHA256
3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6
-
SHA512
e3651f6556b04182304e337037b23b897f3878e6672a936877f9f9a0b62726189cb644745f3307cb7fa9d580c3ea4d5bffe887fd9367b66277a83e7de222042c
-
SSDEEP
24576:/tate0NMGGWxYrqRYNZ/zkzBJpy0v8cQAPsmocNUjoNVef4pqRxD:1GN1YrPD/gBJpjvGUsmTeMNVYRxD
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 624 3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe 624 3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ESPI11.dll 3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe File opened for modification C:\Windows\SysWOW64\ESPI11.dll 3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 624 3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe 624 3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe"C:\Users\Admin\AppData\Local\Temp\3dd80c2bcb30dc5227463d66f9794b403512eb7d58b3736ad016ef8e272ce6e6.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5471b98da9b92d5e74b4aba84705bdad3
SHA11398cad906e1fe7a814a55838a8518a562b3341d
SHA2568f73b2d0cc300fc637f9c71858d8390fac78360397e64b8ddaf751e81cc3e68d
SHA512a382e610789f8a60246055cb807f9479dddaffd08e887d79ccda82077470339c4bd7747618ed8e3515c068b79cadba511255426602960ff7e7d9fd50b69a3109