Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 21:38
Behavioral task
behavioral1
Sample
e6b54aa0f6aa5705873c67ae72a007b2c189072a14bfa8f61b4a2fd5168b7f0fN.exe
Resource
win7-20241010-en
General
-
Target
e6b54aa0f6aa5705873c67ae72a007b2c189072a14bfa8f61b4a2fd5168b7f0fN.exe
-
Size
83KB
-
MD5
3a444a24b51acdd05fb17653b0a051a0
-
SHA1
dfba9792a81295a8c74ec5df294f00ba31103773
-
SHA256
e6b54aa0f6aa5705873c67ae72a007b2c189072a14bfa8f61b4a2fd5168b7f0f
-
SHA512
1f200763cbd1952729b596fed38f425269804f4d7cf6ff020149cdfb7ee93be015fada02c5b3ba38c34ee97bc2dbb583eca569cad3b349278c8180975ab52664
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3300-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3300-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3300-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000d000000023a3e-12.dat upx behavioral2/memory/3300-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3300-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6b54aa0f6aa5705873c67ae72a007b2c189072a14bfa8f61b4a2fd5168b7f0fN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56132ddc2b87815e8870b8f6b83116d99
SHA1ff77859ec967d2bac63e8e06025a64adf91e348a
SHA2561dab1a20128729935c8330ab49631d431f4b2fe5979523f2167bd53141d59f25
SHA512f76d9e9e1d15bc07c5873d5f3979a8d3cab98147b44a545dd6d7c38dcd752ff0865c3d9681837dcb9ddbe47ba579cd900c498dc0fe79f1ce64c4d0bb7fab8bcc