Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2022, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
367KB
-
MD5
89211f5f9092f9d78de071e5d29d9300
-
SHA1
6a189bc431287ccea5600e3409c174027136322a
-
SHA256
ffc415d99e35512b281f93eaa46055035efc1ee5635fec25b2c1ff1771374a68
-
SHA512
9d0d3a0d3f8989df597e82f09a135c2e4a86dd579dd607eabe13a4a5962219e7ecd04c225824d21b17a68035e4d3264123ad7b30114d34cf7ce6f48a0bb38e78
-
SSDEEP
6144:sm1kqMLjz7p9RxtvF4TfWerihaa3WWuzbgwuRgwVfU:smaqMXz7pr/F4Tfn+unnJ
Malware Config
Extracted
nymaim
208.67.104.97
85.31.46.167
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2588 Cleaner.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation file.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0016000000022e4e-139.dat autoit_exe behavioral2/files/0x0016000000022e4e-140.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 13 IoCs
pid pid_target Process procid_target 2248 3988 WerFault.exe 79 1808 3988 WerFault.exe 79 4856 3988 WerFault.exe 79 4800 3988 WerFault.exe 79 1044 3988 WerFault.exe 79 1532 3988 WerFault.exe 79 480 3988 WerFault.exe 79 3552 3988 WerFault.exe 79 4372 3988 WerFault.exe 79 2776 2588 WerFault.exe 109 4420 3988 WerFault.exe 79 2860 3988 WerFault.exe 79 3920 3988 WerFault.exe 79 -
Kills process with taskkill 1 IoCs
pid Process 1892 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3988 file.exe 3988 file.exe 3988 file.exe 3988 file.exe 3988 file.exe 3988 file.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3988 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 taskkill.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3636 3988 file.exe 107 PID 3988 wrote to memory of 3636 3988 file.exe 107 PID 3988 wrote to memory of 3636 3988 file.exe 107 PID 3636 wrote to memory of 2588 3636 cmd.exe 109 PID 3636 wrote to memory of 2588 3636 cmd.exe 109 PID 3988 wrote to memory of 4812 3988 file.exe 117 PID 3988 wrote to memory of 4812 3988 file.exe 117 PID 3988 wrote to memory of 4812 3988 file.exe 117 PID 4812 wrote to memory of 1892 4812 cmd.exe 121 PID 4812 wrote to memory of 1892 4812 cmd.exe 121 PID 4812 wrote to memory of 1892 4812 cmd.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 4522⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7642⤵
- Program crash
PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7842⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7842⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 8562⤵
- Program crash
PID:1044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 9202⤵
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 9242⤵
- Program crash
PID:480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 10482⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 13922⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\ai1RBc9mzPXpxdtsvSruBFwTTsnnu\Cleaner.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\ai1RBc9mzPXpxdtsvSruBFwTTsnnu\Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\ai1RBc9mzPXpxdtsvSruBFwTTsnnu\Cleaner.exe"3⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2588 -s 9724⤵
- Program crash
PID:2776
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 14082⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 17122⤵
- Program crash
PID:2860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "file.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\file.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "file.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 4922⤵
- Program crash
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3988 -ip 39881⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3988 -ip 39881⤵PID:764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3988 -ip 39881⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3988 -ip 39881⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3988 -ip 39881⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3988 -ip 39881⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3988 -ip 39881⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3988 -ip 39881⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3988 -ip 39881⤵PID:424
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 2588 -ip 25881⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3988 -ip 39881⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3988 -ip 39881⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3988 -ip 39881⤵PID:1684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD504514bd4962f7d60679434e0ebe49184
SHA11493a5447eb8156a7d7aecff60ee8bfba2209526
SHA256c394b068aa87264419f60838a8812b750e67cf93f2494c62b9078c3708072568
SHA512a71c7ed5dfdda22f095dc99b16e8342a42e3361be16e0241dbf8983dd0d5f6e90eb0299aac1815cf78ad3a9f15fa89b42b720b7f818ee5f502300f102ef4c93e
-
Filesize
3.8MB
MD504514bd4962f7d60679434e0ebe49184
SHA11493a5447eb8156a7d7aecff60ee8bfba2209526
SHA256c394b068aa87264419f60838a8812b750e67cf93f2494c62b9078c3708072568
SHA512a71c7ed5dfdda22f095dc99b16e8342a42e3361be16e0241dbf8983dd0d5f6e90eb0299aac1815cf78ad3a9f15fa89b42b720b7f818ee5f502300f102ef4c93e