Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe
Resource
win10v2004-20220901-en
General
-
Target
87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe
-
Size
645KB
-
MD5
1edb5b5dc20e15f7bc71477a676f6750
-
SHA1
d54e310a74fd27350d996de5cb5fc1cb6a5e171d
-
SHA256
87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2
-
SHA512
54ca90376117befac611f5f00d27e6763eccbf3d5d9b5507795e2eb8ac1bbaec094e74a8ec1043b9889fc8777c1660f213ebca8794ccd805bf0371c2fa648ec1
-
SSDEEP
12288:s/vRF7BP0jii2YBLSNcQ/F9Xvf2gXLP0RQg:6AiirhIcYf706g
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3056 3188 WerFault.exe 80 952 404 WerFault.exe 88 896 2100 WerFault.exe 89 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\ 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 404 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 2100 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3188 wrote to memory of 404 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 88 PID 3188 wrote to memory of 404 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 88 PID 3188 wrote to memory of 404 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 88 PID 3188 wrote to memory of 2100 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 89 PID 3188 wrote to memory of 2100 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 89 PID 3188 wrote to memory of 2100 3188 87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe"C:\Users\Admin\AppData\Local\Temp\87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 4682⤵
- Program crash
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exestart2⤵
- Checks BIOS information in registry
- Enumerates system info in registry
- Suspicious use of UnmapMainImage
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 5603⤵
- Program crash
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\87db9597feb8c92bd8720fb8b8a3ed164b54f624238302d5624c465ac0cbe2b2.exewatch2⤵
- Suspicious use of UnmapMainImage
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 5603⤵
- Program crash
PID:896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3188 -ip 31881⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 404 -ip 4041⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2100 -ip 21001⤵PID:380