Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
SoftWare.exe
Resource
win7-20240903-en
General
-
Target
SoftWare.exe
-
Size
339KB
-
MD5
d5c85984a2e84a7f39fd28fab73f0a30
-
SHA1
feb059a77cad8e9553c3892263504431d227b2ac
-
SHA256
61a6bf9a926e6de511a928eec1e7a8c69ceef34c7db814ebc8dab1dbcb17f62b
-
SHA512
2c2ca0bd9899bfb2feae54eee45f3a78b0e7e7508d8c93f0ce011db6c1b3479d6ba7643238520e35bc3cbc02e03322999f37be72ebf335c7fc7f351e00fe647e
-
SSDEEP
6144:KpUZjbNfI2ENzKa5AgnL1hGGxQd3mr4jjRUyNMdU7HyEaJP2LG0O0FI:KpUNNQQaWgFE3L9NMmaJP2LG0O0F
Malware Config
Extracted
lumma
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1520 SoftWare.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 4848 1520 SoftWare.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SoftWare.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85 PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85 PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85 PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85 PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85 PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85 PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85 PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85 PID 1520 wrote to memory of 4848 1520 SoftWare.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\SoftWare.exe"C:\Users\Admin\AppData\Local\Temp\SoftWare.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5da941aa4599930eee1511e8088be517f
SHA1902e542d62fe60c3e2c2c1ccfc0659a49f78b8ea
SHA2567821052d1bf901cf03e33e054fdbab5ab4d0dfb8ff039f9e9386416fd087782c
SHA512d6da7e6e50c9125e8c62dc07f40284d07d5aa43f5c73fc0621ecef6f16549989f03f1a1bf56527dcf02c31fcd8858d3db8e62d5dbb86439466b49a4bc49abbe0