Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe
Resource
win10v2004-20220812-en
General
-
Target
3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe
-
Size
170KB
-
MD5
3573241e85df852e1ac4e97b75578136
-
SHA1
29490a0768445e2aa9ae681ed06b1bf592e5d4ce
-
SHA256
3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf
-
SHA512
aff2123bc3d3dd23f07b9c734d71891c4d122dcaefe0355ff47b9f3d9513d33bf61c80a956ea01da6eed9b7c045ad806c789a8189891bb2fde3857c1336a80eb
-
SSDEEP
3072:Ax99CSJFjWsh8XcuzshXbsQixSIxG6XlzC3z8j:i9lC420I1pxH1zC3z8j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4988 msa.exe -
resource yara_rule behavioral2/memory/2140-133-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/memory/2140-134-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/memory/4988-139-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/memory/4988-140-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/memory/2140-141-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/memory/4988-142-0x0000000000400000-0x0000000000480000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\msa.exe 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job msa.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job msa.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe File created C:\Windows\msa.exe 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2256 4988 WerFault.exe 80 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\International msa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2140 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe 2140 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe 4988 msa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2140 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe 4988 msa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2140 wrote to memory of 4988 2140 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe 80 PID 2140 wrote to memory of 4988 2140 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe 80 PID 2140 wrote to memory of 4988 2140 3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe"C:\Users\Admin\AppData\Local\Temp\3c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 8723⤵
- Program crash
PID:2256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4988 -ip 49881⤵PID:3500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426B
MD58117281e74e61806e6bdbd938d7a40ce
SHA18077dee770c9ebf5927f3d2e5b13a5c6846d8020
SHA2566ac30aad121ea11ddd2bf0f24e67428e07527de43073c6bedc42238a0582cc6d
SHA5120d05d5b8ab998dcf02ad8a9b39fefe73da6ff1bf988b3fb2c391e476b0bcf00b62016f3916f01abbbba7bdaab2dfe35c8853315274acccdb16800f00203d31fa
-
Filesize
170KB
MD53573241e85df852e1ac4e97b75578136
SHA129490a0768445e2aa9ae681ed06b1bf592e5d4ce
SHA2563c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf
SHA512aff2123bc3d3dd23f07b9c734d71891c4d122dcaefe0355ff47b9f3d9513d33bf61c80a956ea01da6eed9b7c045ad806c789a8189891bb2fde3857c1336a80eb
-
Filesize
170KB
MD53573241e85df852e1ac4e97b75578136
SHA129490a0768445e2aa9ae681ed06b1bf592e5d4ce
SHA2563c103b2fe4b0e95ecdc691c43696d6c506603d57eda0646c2f150500f9b884cf
SHA512aff2123bc3d3dd23f07b9c734d71891c4d122dcaefe0355ff47b9f3d9513d33bf61c80a956ea01da6eed9b7c045ad806c789a8189891bb2fde3857c1336a80eb