Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 20:20
Behavioral task
behavioral1
Sample
118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9.exe
Resource
win10v2004-20220812-en
General
-
Target
118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9.exe
-
Size
47KB
-
MD5
9dfa96963e3e06fe8cd4e990f8afb757
-
SHA1
087750567b729ffc05f924c7e696357417e45c00
-
SHA256
118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9
-
SHA512
983830d49f21d042d58373ea245f758c8cab55d54b66a2f3d625e78c2dcdffbc379338de41cc2cfe5a8f879bd338d20256eb3fd38b7cc520037a9cff3e08ab33
-
SSDEEP
768:QxWjuw5kgv4rSdcIddTOQioj9keIeuvW7gUV/4SkWxHqA0jgU5FxfthjLHSXPM00:QEj/XQrNIv7ioBkeqvWkMRN08U53nY0p
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3252 System64.exe -
resource yara_rule behavioral2/memory/976-132-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022e2f-133.dat upx behavioral2/files/0x0006000000022e2f-134.dat upx behavioral2/files/0x0006000000022e2f-136.dat upx behavioral2/files/0x0006000000022e2f-135.dat upx behavioral2/memory/2620-138-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2620-139-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2620-140-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3252-142-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/976-143-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 3252 System64.exe 3252 System64.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\System64.exe 118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9.exe File opened for modification C:\Windows\SysWOW64\System64.exe 118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9.exe File created C:\Windows\SysWOW64\System64.exe System64.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3252 set thread context of 2620 3252 System64.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 1424 2620 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2620 3252 System64.exe 83 PID 3252 wrote to memory of 2620 3252 System64.exe 83 PID 3252 wrote to memory of 2620 3252 System64.exe 83 PID 3252 wrote to memory of 2620 3252 System64.exe 83 PID 3252 wrote to memory of 2620 3252 System64.exe 83 PID 3252 wrote to memory of 2620 3252 System64.exe 83 PID 3252 wrote to memory of 2620 3252 System64.exe 83 PID 3252 wrote to memory of 2620 3252 System64.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9.exe"C:\Users\Admin\AppData\Local\Temp\118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9.exe"1⤵
- Drops file in System32 directory
PID:976
-
C:\Windows\SysWOW64\System64.exeC:\Windows\SysWOW64\System64.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\userinit.exe"C:\Windows\system32\userinit.exe"2⤵PID:2620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 123⤵
- Program crash
PID:1424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2620 -ip 26201⤵PID:5088
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD59dfa96963e3e06fe8cd4e990f8afb757
SHA1087750567b729ffc05f924c7e696357417e45c00
SHA256118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9
SHA512983830d49f21d042d58373ea245f758c8cab55d54b66a2f3d625e78c2dcdffbc379338de41cc2cfe5a8f879bd338d20256eb3fd38b7cc520037a9cff3e08ab33
-
Filesize
47KB
MD59dfa96963e3e06fe8cd4e990f8afb757
SHA1087750567b729ffc05f924c7e696357417e45c00
SHA256118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9
SHA512983830d49f21d042d58373ea245f758c8cab55d54b66a2f3d625e78c2dcdffbc379338de41cc2cfe5a8f879bd338d20256eb3fd38b7cc520037a9cff3e08ab33
-
Filesize
47KB
MD59dfa96963e3e06fe8cd4e990f8afb757
SHA1087750567b729ffc05f924c7e696357417e45c00
SHA256118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9
SHA512983830d49f21d042d58373ea245f758c8cab55d54b66a2f3d625e78c2dcdffbc379338de41cc2cfe5a8f879bd338d20256eb3fd38b7cc520037a9cff3e08ab33
-
Filesize
47KB
MD59dfa96963e3e06fe8cd4e990f8afb757
SHA1087750567b729ffc05f924c7e696357417e45c00
SHA256118b0abb22d86c5572a7acef747c35630052b1350e2c454de03497e566c4f7b9
SHA512983830d49f21d042d58373ea245f758c8cab55d54b66a2f3d625e78c2dcdffbc379338de41cc2cfe5a8f879bd338d20256eb3fd38b7cc520037a9cff3e08ab33