Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
204s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
24/08/2021, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
A56C0274E6EA9BD32141634A92052D91.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
A56C0274E6EA9BD32141634A92052D91.exe
Resource
win10v20210410
General
-
Target
A56C0274E6EA9BD32141634A92052D91.exe
-
Size
4.1MB
-
MD5
a56c0274e6ea9bd32141634a92052d91
-
SHA1
0f69b4fcbda90184075b84d12217abbd0c07d704
-
SHA256
4d6904b252c292f5aefe176877720e6e8520c977c9f27ba46c92e5a0b6796016
-
SHA512
c21c368a8d9e59b61ddb409958b071f206bc1c10e42b1a378a6b32b01fa4a9e107d1b840a0351a2ef3c787881e87d842ae12bd4c49050feb2dab5c7247088526
Malware Config
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 1484 rundll32.exe 51 -
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/860-148-0x0000000003200000-0x000000000329D000-memory.dmp family_vidar behavioral1/memory/860-153-0x0000000000400000-0x0000000002D0E000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x00030000000130c8-68.dat aspack_v212_v242 behavioral1/files/0x00030000000130c8-67.dat aspack_v212_v242 behavioral1/files/0x00030000000130c7-69.dat aspack_v212_v242 behavioral1/files/0x00030000000130c7-70.dat aspack_v212_v242 behavioral1/files/0x00030000000130ca-73.dat aspack_v212_v242 behavioral1/files/0x00030000000130ca-74.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 376 setup_install.exe 1384 Fri17e57b57304ad6467.exe 1804 WerFault.exe 860 Fri17c3ec4b03a0d8e6.exe -
Loads dropped DLL 15 IoCs
pid Process 1972 A56C0274E6EA9BD32141634A92052D91.exe 1972 A56C0274E6EA9BD32141634A92052D91.exe 1972 A56C0274E6EA9BD32141634A92052D91.exe 376 setup_install.exe 376 setup_install.exe 376 setup_install.exe 376 setup_install.exe 376 setup_install.exe 376 setup_install.exe 376 setup_install.exe 376 setup_install.exe 928 cmd.exe 928 cmd.exe 2036 cmd.exe 2036 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1804 860 WerFault.exe 40 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 376 1972 A56C0274E6EA9BD32141634A92052D91.exe 29 PID 1972 wrote to memory of 376 1972 A56C0274E6EA9BD32141634A92052D91.exe 29 PID 1972 wrote to memory of 376 1972 A56C0274E6EA9BD32141634A92052D91.exe 29 PID 1972 wrote to memory of 376 1972 A56C0274E6EA9BD32141634A92052D91.exe 29 PID 1972 wrote to memory of 376 1972 A56C0274E6EA9BD32141634A92052D91.exe 29 PID 1972 wrote to memory of 376 1972 A56C0274E6EA9BD32141634A92052D91.exe 29 PID 1972 wrote to memory of 376 1972 A56C0274E6EA9BD32141634A92052D91.exe 29 PID 376 wrote to memory of 672 376 setup_install.exe 31 PID 376 wrote to memory of 672 376 setup_install.exe 31 PID 376 wrote to memory of 672 376 setup_install.exe 31 PID 376 wrote to memory of 672 376 setup_install.exe 31 PID 376 wrote to memory of 672 376 setup_install.exe 31 PID 376 wrote to memory of 672 376 setup_install.exe 31 PID 376 wrote to memory of 672 376 setup_install.exe 31 PID 376 wrote to memory of 928 376 setup_install.exe 48 PID 376 wrote to memory of 928 376 setup_install.exe 48 PID 376 wrote to memory of 928 376 setup_install.exe 48 PID 376 wrote to memory of 928 376 setup_install.exe 48 PID 376 wrote to memory of 928 376 setup_install.exe 48 PID 376 wrote to memory of 928 376 setup_install.exe 48 PID 376 wrote to memory of 928 376 setup_install.exe 48 PID 376 wrote to memory of 752 376 setup_install.exe 47 PID 376 wrote to memory of 752 376 setup_install.exe 47 PID 376 wrote to memory of 752 376 setup_install.exe 47 PID 376 wrote to memory of 752 376 setup_install.exe 47 PID 376 wrote to memory of 752 376 setup_install.exe 47 PID 376 wrote to memory of 752 376 setup_install.exe 47 PID 376 wrote to memory of 752 376 setup_install.exe 47 PID 376 wrote to memory of 344 376 setup_install.exe 32 PID 376 wrote to memory of 344 376 setup_install.exe 32 PID 376 wrote to memory of 344 376 setup_install.exe 32 PID 376 wrote to memory of 344 376 setup_install.exe 32 PID 376 wrote to memory of 344 376 setup_install.exe 32 PID 376 wrote to memory of 344 376 setup_install.exe 32 PID 376 wrote to memory of 344 376 setup_install.exe 32 PID 376 wrote to memory of 2036 376 setup_install.exe 46 PID 376 wrote to memory of 2036 376 setup_install.exe 46 PID 376 wrote to memory of 2036 376 setup_install.exe 46 PID 376 wrote to memory of 2036 376 setup_install.exe 46 PID 376 wrote to memory of 2036 376 setup_install.exe 46 PID 376 wrote to memory of 2036 376 setup_install.exe 46 PID 376 wrote to memory of 2036 376 setup_install.exe 46 PID 376 wrote to memory of 552 376 setup_install.exe 45 PID 376 wrote to memory of 552 376 setup_install.exe 45 PID 376 wrote to memory of 552 376 setup_install.exe 45 PID 376 wrote to memory of 552 376 setup_install.exe 45 PID 376 wrote to memory of 552 376 setup_install.exe 45 PID 376 wrote to memory of 552 376 setup_install.exe 45 PID 376 wrote to memory of 552 376 setup_install.exe 45 PID 928 wrote to memory of 1384 928 cmd.exe 33 PID 928 wrote to memory of 1384 928 cmd.exe 33 PID 928 wrote to memory of 1384 928 cmd.exe 33 PID 928 wrote to memory of 1384 928 cmd.exe 33 PID 928 wrote to memory of 1384 928 cmd.exe 33 PID 928 wrote to memory of 1384 928 cmd.exe 33 PID 928 wrote to memory of 1384 928 cmd.exe 33 PID 376 wrote to memory of 1896 376 setup_install.exe 44 PID 376 wrote to memory of 1896 376 setup_install.exe 44 PID 376 wrote to memory of 1896 376 setup_install.exe 44 PID 376 wrote to memory of 1896 376 setup_install.exe 44 PID 376 wrote to memory of 1896 376 setup_install.exe 44 PID 376 wrote to memory of 1896 376 setup_install.exe 44 PID 376 wrote to memory of 1896 376 setup_install.exe 44 PID 2036 wrote to memory of 860 2036 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\A56C0274E6EA9BD32141634A92052D91.exe"C:\Users\Admin\AppData\Local\Temp\A56C0274E6EA9BD32141634A92052D91.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵PID:672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri17f148864b7f11.exe3⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri17f148864b7f11.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri17f148864b7f11.exe"4⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri17f148864b7f11.exeFri17f148864b7f11.exe4⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri17bbd34709019a06.exe3⤵PID:1672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri17384323b14.exe3⤵PID:1716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri17db701d83a67.exe3⤵PID:1360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1743bf1fe022.exe3⤵PID:1896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri17523e6b49e.exe3⤵PID:552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri17c3ec4b03a0d8e6.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri17935370d9f965.exe3⤵PID:752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri17e57b57304ad6467.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:928
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri17e57b57304ad6467.exeFri17e57b57304ad6467.exe1⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri17e57b57304ad6467.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri17e57b57304ad6467.exe" -a2⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri17db701d83a67.exeFri17db701d83a67.exe1⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri1743bf1fe022.exeFri1743bf1fe022.exe1⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\7zS4B780E35\Fri17c3ec4b03a0d8e6.exeFri17c3ec4b03a0d8e6.exe1⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 9602⤵
- Executes dropped EXE
- Program crash
PID:1804
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:968
-