Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2024, 05:05
Behavioral task
behavioral1
Sample
165602a79e162b277de77975a938978702eddd0641363895633de56c90f4a80aN.exe
Resource
win7-20241023-en
General
-
Target
165602a79e162b277de77975a938978702eddd0641363895633de56c90f4a80aN.exe
-
Size
83KB
-
MD5
1e93934b18a5d7997f88e99b8fae32b0
-
SHA1
7ea8bec4ebce91ffc34c00353b242d8b78192ead
-
SHA256
165602a79e162b277de77975a938978702eddd0641363895633de56c90f4a80a
-
SHA512
bb0bc35e148284d18f34a3652332cb874bb56a3aaaf7ddc00652f110a0f7cacc8cb2f56fa0d3476484ae34a54eaba25c9cccf461ffa2e843571c807231ab97f1
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IKe:LJ0TAz6Mte4A+aaZx8EnCGVuI3
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4324-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b96-12.dat upx behavioral2/memory/4324-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 165602a79e162b277de77975a938978702eddd0641363895633de56c90f4a80aN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD52ed48bc3e017e0f87ab1604dbd0e6fd4
SHA1ae2275dbd534f97a60e42664eabc37d8ab77243d
SHA256868edc586bc7264b5a10e202f826814ba8c6116ed5be094b70fbb4ac6fcbd396
SHA512b82940da4a612daa820315faafe636da1841024cc62736c8ce3261c5226fa0677d9649434d4a80b65cac1e488daf7773fdd224c63b6673975290b50fe7953a21