Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe
Resource
win10v2004-20220901-en
General
-
Target
26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe
-
Size
384KB
-
MD5
0d371bc5e9494173244c9c4103f892e5
-
SHA1
192ca7fe6fb8187ba3ddb48edf7f76ab9a02cc6e
-
SHA256
26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8
-
SHA512
586dc0d3a7f1580ff9b7a09af6acc1516f28b4ea0939ebd5ca716784766e419623c21e35223a63c8e0f8a69a4860b89dc37b7fb4680e1256dffd2fcd5fae1222
-
SSDEEP
6144:v5HXb3HpKYZpJf5rUx6kqHlVQeUbhQ9idIKxaunCkoxkhIqkSCtmqWom94CBZ0Z4:v5HX7pPV5IiOQkddxnfoxkDk7tmOmmCj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 936 gK01805JjMfM01805.exe -
resource yara_rule behavioral2/memory/1632-132-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/1632-136-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/936-137-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/936-138-0x0000000000400000-0x00000000004EE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gK01805JjMfM01805 = "C:\\ProgramData\\gK01805JjMfM01805\\gK01805JjMfM01805.exe" gK01805JjMfM01805.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1684 1632 WerFault.exe 79 5112 936 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe Token: SeDebugPrivilege 936 gK01805JjMfM01805.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 936 gK01805JjMfM01805.exe 936 gK01805JjMfM01805.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 936 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 83 PID 1632 wrote to memory of 936 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 83 PID 1632 wrote to memory of 936 1632 26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe"C:\Users\Admin\AppData\Local\Temp\26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 6722⤵
- Program crash
PID:1684
-
-
C:\ProgramData\gK01805JjMfM01805\gK01805JjMfM01805.exe"C:\ProgramData\gK01805JjMfM01805\gK01805JjMfM01805.exe" "C:\Users\Admin\AppData\Local\Temp\26474edec254c76e147e444ce4ecc32aca5e1ccfb01b5aed50160be56c6667e8.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 6723⤵
- Program crash
PID:5112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1632 -ip 16321⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 936 -ip 9361⤵PID:3736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5a7cc7f025155b215e48031bba5a8d4ce
SHA16e2dfa273d5122393502a0469203a989fec207f4
SHA2564fe31885ef3660b3ce60dacb9f39ad6e9508d3bfa710beae77278543ead929f0
SHA512beaa6f4ad502aa84df1a5c6e7005f59dbff7e4318d2385e84e32432605bdaa387f13a8c52a82e7f04aa4f1ed6aa268d4f9ca0aa521da501646331205b5edfe17
-
Filesize
384KB
MD5a7cc7f025155b215e48031bba5a8d4ce
SHA16e2dfa273d5122393502a0469203a989fec207f4
SHA2564fe31885ef3660b3ce60dacb9f39ad6e9508d3bfa710beae77278543ead929f0
SHA512beaa6f4ad502aa84df1a5c6e7005f59dbff7e4318d2385e84e32432605bdaa387f13a8c52a82e7f04aa4f1ed6aa268d4f9ca0aa521da501646331205b5edfe17