Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 22:36
Behavioral task
behavioral1
Sample
5e6f0a46dc43f75ee238f0d4738176be38ad10345badc820e3f46d4adc9e04feN.exe
Resource
win7-20240708-en
General
-
Target
5e6f0a46dc43f75ee238f0d4738176be38ad10345badc820e3f46d4adc9e04feN.exe
-
Size
83KB
-
MD5
ad56975f31aef3af5d2bafc14e80a920
-
SHA1
f2d64fe70e06d10654ac97b84887729f3ef99039
-
SHA256
5e6f0a46dc43f75ee238f0d4738176be38ad10345badc820e3f46d4adc9e04fe
-
SHA512
26a687815ae4a6c048abad9f5ae531509df101e58996835e3aa158996a00d302c79d908f2474b3fd9f36d7b4d2eb105805a7f780a389312d93df3775c4297be2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+0K:LJ0TAz6Mte4A+aaZx8EnCGVu0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1384-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1384-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1384-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1384-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c000000023b65-11.dat upx behavioral2/memory/1384-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1384-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e6f0a46dc43f75ee238f0d4738176be38ad10345badc820e3f46d4adc9e04feN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5f501cece74e90bdcdc101b0f1114d827
SHA1858787ce35c857f1f20167d4b9e9b12fdfc3e529
SHA256bfda4c5aefc18499fc9f31a0e7ad2ebbb1a8a64c2d46130ac2536634c3b05452
SHA5128011d2a8a7987461ae84b6e57fa74035dd78c614f71b2f9787aea6eb751fbc67eee3593b86ebb5a10781644acf6ac2df89db390e74ededf5e6a6faf0c9072f36