Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd.exe
Resource
win10v2004-20241007-en
General
-
Target
dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd.exe
-
Size
1.4MB
-
MD5
224926142f180ff25e7dcdf4ed3c4b56
-
SHA1
1313ac8ba228d83e961a92db373b3b52c39ee8f0
-
SHA256
dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd
-
SHA512
2588633b48f822a51fa9bf7b07c40edb0b87f3412386c8a217d359a1b1fc35e4bef72fa64952b052d969f9e4b20370d1859902c05987a4f2c0f4b282ce738b4c
-
SSDEEP
24576:q7zNkhm5PB3M/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:yNEm5Z3MLNiXicJFFRGNzj3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4964 alg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 916 dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd.exe"C:\Users\Admin\AppData\Local\Temp\dfbda2b0f877c1f0e3471823979a38572df4d4fe3d6291cdab5e48075dd230dd.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:916
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d8a4907578bb21a52f84fd0f107139b6
SHA13e2779556cf4bb67a981fd2129ab69ffecc54739
SHA2564cc660fd1650a801c7d00d7f6193ee73712835807b2254897ba75fdc600e5dae
SHA51206ee8d1a9ed318f1adf56aaf55660014f06bbcde061a32a2dcb82091d04d6a19a633d04f2a91f7f452d3420569e56cc8aaa367df293c85963f451f971d3bd44b