Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 16:38
Behavioral task
behavioral1
Sample
4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe
Resource
win7-20240708-en
General
-
Target
4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe
-
Size
83KB
-
MD5
723fbca23bef03d03ade1ed56ec32420
-
SHA1
35a444c94998bb78db1c2bba4e832632cd7decb9
-
SHA256
4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3d
-
SHA512
5b9e9a9ba5515832f0d3d750ff86eddfceaf84d044f7a6396b4ff1664d4f47adccf5238f083807719f315ee886e7002db91952c343944d0ca270ce49809959d8
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4728-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4728-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4728-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4728-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0032000000023b75-12.dat upx behavioral2/memory/4728-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4728-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58c394fcfe1c9f15b5ce5b2d9bb977338
SHA1be3b4dfff069ba0ba5a4a42f8134564a26891eb8
SHA256070430c63a8bb2acf0816a21c3d31b987b8727e18991d9d775ff02f10b507d97
SHA512662c96183ac6532a068528e4e35e1e5b8afbbbfa0d37079ac319704f73c2aea1b6ca56bb52f8a44f31147849db2d408ad8e778e04789583229af2d33d697b3ee