Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    8s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/10/2024, 20:50

General

  • Target

    GODDER DOS TOOL.exe

  • Size

    305KB

  • MD5

    2551994ca9f7ed6b43499e161ea9443b

  • SHA1

    ec58f009e45f54d1d0bd4a70b97e926a64ace4dc

  • SHA256

    01162ea172218bd4462f683209f8046c6a3cae30bd64a5dc0e20a1e8ce78009f

  • SHA512

    ebf630e28e53202c3fae7f3f961432e04e45b6569948f18e77a5fd7077a198308785e17e033aed8251638e3e061b00b5c7ef83efe3a8bd3b2584d7a3d2b956b5

  • SSDEEP

    6144:t/iQb+ckQsH8TDRGKJkSvGUlYG2dtX+t4Y8h0:0Qnk3GDYKGcblwtX+t4Y8h0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GODDER DOS TOOL.exe
    "C:\Users\Admin\AppData\Local\Temp\GODDER DOS TOOL.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\GODDER DOS TOOL.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GODDER DOS TOOL.bat

    Filesize

    178B

    MD5

    d8e9295f0a57d7c6c133dc0d3a3b53ca

    SHA1

    583c303c80f2aacc0278367bef4f3eb373047520

    SHA256

    75ae0e115c14ebc09869df6cdb303354cbd34c1e58614c63ddf60848748782f6

    SHA512

    fb9937dc3e6905f2af8cc4ab8ca026ed64d2364e96cd24e80de1d81e1cc354a4ed60b0fea18bf7148aa31b2c3852f9c4965c5cc9f985f13ea5a43632cddb6ce6