Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 12:45
Behavioral task
behavioral1
Sample
3824bf3fdf69b3e20f11aff46343d42a5b6e10a7b4f2d647bab14df4bce65541N.exe
Resource
win7-20240708-en
General
-
Target
3824bf3fdf69b3e20f11aff46343d42a5b6e10a7b4f2d647bab14df4bce65541N.exe
-
Size
83KB
-
MD5
04911f5900f839bef68cce3a17f87e50
-
SHA1
802b6ad8c6ff38351a1861739c64a011147b6c12
-
SHA256
3824bf3fdf69b3e20f11aff46343d42a5b6e10a7b4f2d647bab14df4bce65541
-
SHA512
a601542aaafb4c9f14e5618073f31506e811bba081c34b2b90dc20cf98f41111b7b56cf540343feebd4c3521634ff0af4192bfe6001052de8f3a18ef531885c5
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cK:LJ0TAz6Mte4A+aaZx8EnCGVuc
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2700-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2700-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2700-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000d000000023a4b-12.dat upx behavioral2/memory/2700-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2700-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3824bf3fdf69b3e20f11aff46343d42a5b6e10a7b4f2d647bab14df4bce65541N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5f010ef3a87e887566aac9b0d34d164bf
SHA16fd3d2749f5d0f14eca6887f126f959df3a9a8da
SHA25609ee72a0d1d9efc476734eba2d6eeb58105009205978a9e2d2d4eb8368f9fd4f
SHA5120473b90e8a667c788ad8ca192920ef53b04ab14dc4c7bd3c0e5352bf3cf158fc29e625f140fd077d7c905de6b422f6b6b8c95ac2cf17bea1ff46615c9c2d48ef