Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 00:47
Behavioral task
behavioral1
Sample
1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe
Resource
win10v2004-20220812-en
General
-
Target
1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe
-
Size
89KB
-
MD5
90f7dbc5a9e4db48a4e21cf41b3c63d0
-
SHA1
de210c43141b6a7f32fec4c7d8c7239b10c14802
-
SHA256
1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc
-
SHA512
9ebdac6b2efb083f6390a18d8a9086b8cbb0910bcb6517bff7975e7dd2eb07ff197757fb2ad9e5229c36b0024cc51f7c3857ddc573f490261adb05985000cad1
-
SSDEEP
1536:Uj+Tw1UwIUnfIMOLYDCASt4OsZmmB+vErwX/JBAj8Q6L69/LrE:Uj+TgUwIZMMYxXr8vGKJBAj19M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4404 explorer.exe -
resource yara_rule behavioral2/memory/4848-132-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4848-133-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/files/0x000a000000022e2f-135.dat upx behavioral2/files/0x000a000000022e2f-136.dat upx behavioral2/memory/4404-137-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4404-138-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4404-139-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4848-140-0x0000000000400000-0x0000000000448000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Windows\\explorer.exe\u00a0" 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\explorer.exe 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe File opened for modification C:\Windows\explorer.exe 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 404 4404 WerFault.exe 83 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe \ = "exefile" 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe \Content Type = "application/x-msdownload" 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe \PersistentHandler 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe \PersistentHandler\ = "{098f2470-bae0-11cd-b579-08002b30bfeb}" 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4404 4848 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe 83 PID 4848 wrote to memory of 4404 4848 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe 83 PID 4848 wrote to memory of 4404 4848 1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe"C:\Users\Admin\AppData\Local\Temp\1516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Executes dropped EXE
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 5363⤵
- Program crash
PID:404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4404 -ip 44041⤵PID:4164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD590f7dbc5a9e4db48a4e21cf41b3c63d0
SHA1de210c43141b6a7f32fec4c7d8c7239b10c14802
SHA2561516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc
SHA5129ebdac6b2efb083f6390a18d8a9086b8cbb0910bcb6517bff7975e7dd2eb07ff197757fb2ad9e5229c36b0024cc51f7c3857ddc573f490261adb05985000cad1
-
Filesize
89KB
MD590f7dbc5a9e4db48a4e21cf41b3c63d0
SHA1de210c43141b6a7f32fec4c7d8c7239b10c14802
SHA2561516b4a7196e6f10cd61e1026a712d5493722ed4fd066cbb4253113bdbf666dc
SHA5129ebdac6b2efb083f6390a18d8a9086b8cbb0910bcb6517bff7975e7dd2eb07ff197757fb2ad9e5229c36b0024cc51f7c3857ddc573f490261adb05985000cad1