Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 12:18

General

  • Target

    c84d3baad85c979c26aa2bd5e4a6172ef99c0f4995235c5ea68bb0beded77b39.exe

  • Size

    121KB

  • MD5

    6fc85d918913c7fa53c9353ce45c49c0

  • SHA1

    8a8d4c7c8b03304ba69aa50ccf0916befe67278c

  • SHA256

    c84d3baad85c979c26aa2bd5e4a6172ef99c0f4995235c5ea68bb0beded77b39

  • SHA512

    7477a8cae22f2dca82bcd9537eb6201b077dcd9b07538edd608076c05c4355a822af2e049376b047be7805913a49ad77035d30477599e9356eacac21fdc0e5b1

  • SSDEEP

    1536:Q/lLWcAJcMVR6xdQ2ICr7J7cu9s9ymw/Pg+lo3fOqCLmxVpEBNMIs1e:wLNaVREQanJ7cu9s9PwQxmVtBo

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c84d3baad85c979c26aa2bd5e4a6172ef99c0f4995235c5ea68bb0beded77b39.exe
    "C:\Users\Admin\AppData\Local\Temp\c84d3baad85c979c26aa2bd5e4a6172ef99c0f4995235c5ea68bb0beded77b39.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\c84d3baad85c979c26aa2bd5e4a6172ef99c0f4995235c5ea68bb0beded77b39.exe
      C:\Users\Admin\AppData\Local\Temp\c84d3baad85c979c26aa2bd5e4a6172ef99c0f4995235c5ea68bb0beded77b39.exe
      2⤵
      • Drops file in Windows directory
      PID:1668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 284
      2⤵
      • Program crash
      PID:872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2164 -ip 2164
    1⤵
      PID:3532

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1668-133-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1668-134-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1668-135-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1668-136-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB