Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3quarantine...a5.exe
windows7-x64
10quarantine...a5.exe
windows10-2004-x64
10quarantine...Uv.exe
windows7-x64
8quarantine...Uv.exe
windows10-2004-x64
8quarantine...cc.exe
windows7-x64
10quarantine...cc.exe
windows10-2004-x64
10quarantine...Ja.exe
windows7-x64
10quarantine...Ja.exe
windows10-2004-x64
10quarantine...8e.exe
windows7-x64
3quarantine...8e.exe
windows10-2004-x64
3quarantine...zx.exe
windows7-x64
7quarantine...zx.exe
windows10-2004-x64
7quarantine...FJ.exe
windows7-x64
9quarantine...FJ.exe
windows10-2004-x64
9quarantine...on.exe
windows7-x64
10quarantine...on.exe
windows10-2004-x64
10quarantine/random.exe
windows7-x64
quarantine/random.exe
windows10-2004-x64
3quarantine..._2.exe
windows7-x64
10quarantine..._2.exe
windows10-2004-x64
10quarantine..._3.exe
windows7-x64
10quarantine..._3.exe
windows10-2004-x64
10quarantine..._4.exe
windows7-x64
10quarantine..._4.exe
windows10-2004-x64
10quarantine..._5.exe
windows7-x64
10quarantine..._5.exe
windows10-2004-x64
10quarantine...me.exe
windows7-x64
10quarantine...me.exe
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17/02/2025, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/30adb2328b17bd15cdeb5059c621bd6e9bf0b7e03dd2cdfbadfc837737d424a5.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
quarantine/30adb2328b17bd15cdeb5059c621bd6e9bf0b7e03dd2cdfbadfc837737d424a5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/FKza3Uv.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/FKza3Uv.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
quarantine/af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/d2YQIJa.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
quarantine/d2YQIJa.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
quarantine/f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/jROrnzx.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/jROrnzx.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/kgI01FJ.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
quarantine/kgI01FJ.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/monthdragon.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
quarantine/monthdragon.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/random.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
quarantine/random.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/random_2.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
quarantine/random_2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/random_3.exe
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
quarantine/random_3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
quarantine/random_4.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
quarantine/random_4.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/random_5.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
quarantine/random_5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/sHN20me.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
quarantine/sHN20me.exe
Resource
win10v2004-20250217-en
General
-
Target
quarantine/f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe
-
Size
1.1MB
-
MD5
9e2e378d3752661619257b383c7e248c
-
SHA1
68063571bc4f56bd9a6b2f7d26f208a36980895d
-
SHA256
f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e
-
SHA512
8662f15668eb89acfce2fc4a68e1b8743148b846ee5c07b25cf8ea91073655aa4143fd9abb8bf0045e7adb9e78766335dc796ed39b320546ae078b247b5c38d1
-
SSDEEP
12288:vstqocI4DK2IQKaR9Zb9nQb5VIE19YdouyBn2nbCybbYVcAi28P+QFqO/vt+sJ0G:vfoIxKK9PnWBbYLG2W9cATA14ucsI+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe 2100 f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100