Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
19658963328526236.exe
Resource
win10-20220812-en
General
-
Target
19658963328526236.exe
-
Size
2.1MB
-
MD5
dfe0ba123011bdca4de794f6f5509415
-
SHA1
b4260e4d3abadd70fc4377b0fd5e209e4a603deb
-
SHA256
fcc825b454f02b07064d57dd37ee6b597449c04b56883d7c073c571030cad500
-
SHA512
d10a018511d8176425de6abe3fd475eddd9c2ac411d6384e61a05ffe03a30e056a351c4340fa21479801fe9befd64d284d82d2854bdefc1a95c609b07d6ee4f4
-
SSDEEP
49152:aAxmajJyMYIFIT/O5U4ZUlplyKlFzYbxAB/Q:aA/VyMdFQqKvSiVQ
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2704 19658963328526236.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4384 2704 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3764 schtasks.exe 3900 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2704 19658963328526236.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3764 2704 19658963328526236.exe 66 PID 2704 wrote to memory of 3764 2704 19658963328526236.exe 66 PID 2704 wrote to memory of 3764 2704 19658963328526236.exe 66 PID 2704 wrote to memory of 4820 2704 19658963328526236.exe 68 PID 2704 wrote to memory of 4820 2704 19658963328526236.exe 68 PID 2704 wrote to memory of 4820 2704 19658963328526236.exe 68 PID 2704 wrote to memory of 3900 2704 19658963328526236.exe 70 PID 2704 wrote to memory of 3900 2704 19658963328526236.exe 70 PID 2704 wrote to memory of 3900 2704 19658963328526236.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\19658963328526236.exe"C:\Users\Admin\AppData\Local\Temp\19658963328526236.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"2⤵
- Creates scheduled task(s)
PID:3764
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Event Viewer Snap-in Launcher (29762912)"2⤵PID:4820
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Event Viewer Snap-in Launcher (29762912)" /XML "C:\Users\Admin\AppData\Roaming\EventViewer\tfnme73946158264.tmp"2⤵
- Creates scheduled task(s)
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 5482⤵
- Program crash
PID:4384
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53b0643e9ab3dd4807b3dbfddc81465cb
SHA169d046375de332792721e5f4fbe76aaeab86a400
SHA2567a475d44e2dca938fd547a6f32ebf50d342815e78863a5b082da9c75bf47fe18
SHA512d8d0f9566aa73dc6084bedd1f39b8877486499342a18210914f3cc3c8b4e098c9dabf5da132384fe7f996356f6303ec116c1ac7974311576f4bcd733ddc4d109