Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
289s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
5802733_scan.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5802733_scan.exe
Resource
win10v2004-20241007-en
General
-
Target
5802733_scan.exe
-
Size
1.3MB
-
MD5
a583a512461f3f35c7e0ecfa4467acca
-
SHA1
833c5255bf9b8f672d3d455ed269efcd6f9f9ead
-
SHA256
19c4b597f05925e66ad9e85115611cd6f11a1169c03f3499bf0fb64a4e040781
-
SHA512
d22005b189a3733a4c55b8e9edb248790341743550afa6352e988cc0741c31765dfd358bbfb30767ee869cd7e8b29e8ff5ad253fa86abf87770e796fb2d101e0
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLx7aJMNxqDpe07i7xa6/uNzyxhBFVFq3GRw:f3v+7/5QLx7ae2oai7I6/QuVk33
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4284 set thread context of 2624 4284 5802733_scan.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5802733_scan.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe 2624 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4284 5802733_scan.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4284 5802733_scan.exe 4284 5802733_scan.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4284 5802733_scan.exe 4284 5802733_scan.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4284 wrote to memory of 2624 4284 5802733_scan.exe 87 PID 4284 wrote to memory of 2624 4284 5802733_scan.exe 87 PID 4284 wrote to memory of 2624 4284 5802733_scan.exe 87 PID 4284 wrote to memory of 2624 4284 5802733_scan.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5802733_scan.exe"C:\Users\Admin\AppData\Local\Temp\5802733_scan.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\5802733_scan.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-