Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04/06/2022, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe
Resource
win10v2004-20220414-en
General
-
Target
0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe
-
Size
16KB
-
MD5
8b23aa9f667277aa0c81ab9a9d325c4a
-
SHA1
b21ff7786eab0839ad884f86460733f2e8e7aa8d
-
SHA256
0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a
-
SHA512
2d349a6ed1111a6936aa48c29c581c7dc47e95ca7974bd64db184eb50c925aed1f3047e0247cc966179dee0d2981486bdef84dc4dadd59ec0d2a362d59ff21a2
Malware Config
Signatures
-
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/4464-130-0x0000000000D50000-0x0000000000D5A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe" 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe" 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4248 4464 WerFault.exe 43 2036 3332 WerFault.exe 86 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5080 schtasks.exe 3516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4464 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 3332 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4464 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4464 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe Token: SeDebugPrivilege 3332 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4936 4464 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 80 PID 4464 wrote to memory of 4936 4464 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 80 PID 4464 wrote to memory of 4936 4464 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 80 PID 4936 wrote to memory of 5080 4936 cmd.exe 82 PID 4936 wrote to memory of 5080 4936 cmd.exe 82 PID 4936 wrote to memory of 5080 4936 cmd.exe 82 PID 3332 wrote to memory of 2360 3332 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 87 PID 3332 wrote to memory of 2360 3332 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 87 PID 3332 wrote to memory of 2360 3332 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 87 PID 2360 wrote to memory of 3516 2360 cmd.exe 89 PID 2360 wrote to memory of 3516 2360 cmd.exe 89 PID 2360 wrote to memory of 3516 2360 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe"C:\Users\Admin\AppData\Local\Temp\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:5080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 17442⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4464 -ip 44641⤵PID:5076
-
C:\Users\Admin\AppData\Roaming\Windows\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exeC:\Users\Admin\AppData\Roaming\Windows\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:3516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 17402⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3332 -ip 33321⤵PID:4172