Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 12:04
Behavioral task
behavioral1
Sample
65be1e7c0ad7559d86a1d78d26a49b54c1b694b864664a875f73f0e22876493bN.exe
Resource
win7-20240903-en
General
-
Target
65be1e7c0ad7559d86a1d78d26a49b54c1b694b864664a875f73f0e22876493bN.exe
-
Size
83KB
-
MD5
81701d3328ab7f79e0975dc269fc0ff0
-
SHA1
0466b8587e7a5e827a2f7c970b4ba231a292097e
-
SHA256
65be1e7c0ad7559d86a1d78d26a49b54c1b694b864664a875f73f0e22876493b
-
SHA512
98aa26fd2be77e21723ddcb99459a54817e5761d61f6a45dcb5a60d4e08f473fc0bdd9d18f8348b87373f2e888f53f3480ea0d1683afd03d4bdc9110255fdf15
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4940-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000e000000023a59-11.dat upx behavioral2/memory/4940-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65be1e7c0ad7559d86a1d78d26a49b54c1b694b864664a875f73f0e22876493bN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a2c707888bef79b9a9a615933b03032f
SHA1f2462d165ded05093046604ce0aa766848f83177
SHA25615367a917f2b8d27f4227d9cbd1b7536b3d4773b95c5c74dd580f9cd961cf000
SHA512b1d1aae49385bd03b0ba19fdebf64317ba8bad8cfa932b35c5907b120819694afe3c82a8483ba783429c2e30b8b479c0ef5135cdc03d71f45c1a83dbb35fc848