Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 01:26
Behavioral task
behavioral1
Sample
Malware.Calc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Malware.Calc.exe
Resource
win10v2004-20241007-en
General
-
Target
Malware.Calc.exe
-
Size
72KB
-
MD5
041a28eda8a0b003ac54df9ef74d0069
-
SHA1
34a67f0cc557e2bb8c5b71ea619fb2df6c60816a
-
SHA256
300bb9ac1f607f99e3fbc7814b42552913ef4bcd2d2752f0f909908ae3e46aaf
-
SHA512
8afb649409f28301946c5f5fc31aa0ac49f894a1f45498b6b252b97409c1547dbc520bc2a21bd3a0def011c8507015ead94c7ad0f819ee4811570a564f9ad6b4
-
SSDEEP
1536:IFoYNts8i0K8VGBL6asqQ1pKZhMb+KR0Nc8QsJq39:ejS8vKE8WaJ7Zhe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Malware.Calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2616 OpenWith.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2180 wrote to memory of 392 2180 Malware.Calc.exe 82 PID 2180 wrote to memory of 392 2180 Malware.Calc.exe 82 PID 2180 wrote to memory of 392 2180 Malware.Calc.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware.Calc.exe"C:\Users\Admin\AppData\Local\Temp\Malware.Calc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\calc.execalc.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:392
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2616