Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe
Resource
win10v2004-20220812-en
General
-
Target
ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe
-
Size
713KB
-
MD5
65bf8f83dffef62d1579503822c3b790
-
SHA1
df810334f2dd62277e8c431c88fb31f8c57319c2
-
SHA256
ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208
-
SHA512
af7638c01a4f8acb79b5604d0062b8fd3239a77236fc7c5d824ddce0b1a644abb3c93276e6c0550f48083207648229c993aeb75e58fa8d7998679b4cb45b76a1
-
SSDEEP
12288:Vs+ApVpEYSOPuBOawRa9rBDUGNmX65+SxNPFQbGlHYy/mqEcFlp/j4QWSgBFl:itE30yrBIhKHPFQC+mEspLDW9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4700 ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe -
resource yara_rule behavioral2/memory/4808-133-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/4808-135-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/4808-138-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/4808-140-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/4808-141-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/4700-144-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral2/memory/4700-145-0x0000000000400000-0x000000000059D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208 = "C:\\ProgramData\\System\\ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe" ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 8 IoCs
pid pid_target Process procid_target 2544 4808 WerFault.exe 81 4280 4808 WerFault.exe 81 5012 4808 WerFault.exe 81 4688 4808 WerFault.exe 81 1852 4808 WerFault.exe 81 1144 4808 WerFault.exe 81 3772 4808 WerFault.exe 81 4384 4700 WerFault.exe 94 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4700 4808 ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe 94 PID 4808 wrote to memory of 4700 4808 ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe 94 PID 4808 wrote to memory of 4700 4808 ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe"C:\Users\Admin\AppData\Local\Temp\ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 8162⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 9122⤵
- Program crash
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 9882⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 9882⤵
- Program crash
PID:4688
-
-
C:\ProgramData\System\ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe"C:\ProgramData\System\ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208.exe"2⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 7003⤵
- Program crash
PID:4384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 12242⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 5722⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 2442⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4808 -ip 48081⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4808 -ip 48081⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4808 -ip 48081⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4808 -ip 48081⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4808 -ip 48081⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4808 -ip 48081⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4808 -ip 48081⤵PID:1352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4700 -ip 47001⤵PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD565bf8f83dffef62d1579503822c3b790
SHA1df810334f2dd62277e8c431c88fb31f8c57319c2
SHA256ba54531fde470207f2fe239c7c340d0529f46eff8c184b25736b3c4f13f72208
SHA512af7638c01a4f8acb79b5604d0062b8fd3239a77236fc7c5d824ddce0b1a644abb3c93276e6c0550f48083207648229c993aeb75e58fa8d7998679b4cb45b76a1