Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe
Resource
win10v2004-20220812-en
General
-
Target
71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe
-
Size
2.9MB
-
MD5
ea9907d0308098c06897412307dc115e
-
SHA1
89b1ab33286e461d8878ad2381a47fb3d612579a
-
SHA256
71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877
-
SHA512
1c0f63b0d9a4607cec12d32ddf82484ff07da27e17ef40afe498a0880e500d77d74b58036f42db740a8ca76bc10d6c53ef806d39209b5cfbf5c905234ba3ff0d
-
SSDEEP
49152:EGM4GOrnHwDQSkRfYNjX5+nCi1a67GV+d4L28hUZzqmZxPHvLm48fXq7N4:RDGnkRWN+Ci067DeL2iUZz9ZdvyjfXMW
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1544 71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{534BEB7D-4386-47EF-8ADE-FEA51EFA08DF}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{98B78678-FA22-4FB9-B6BE-0237032ECA9E}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1900 1544 WerFault.exe 74 4644 1544 WerFault.exe 74 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1544 71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe 1544 71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe 1544 71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe 1544 71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1900 1544 71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe 83 PID 1544 wrote to memory of 1900 1544 71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe 83 PID 1544 wrote to memory of 1900 1544 71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe"C:\Users\Admin\AppData\Local\Temp\71f14953764dc352252bb0a19c5861b6262292ea85e1bd2a516b9737bcdf9877.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 10602⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 10602⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1544 -ip 15441⤵PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5d0f2416807f04c559e6394a0a4c7f1d1
SHA17df43ffa3716156d282b1e37d12dd1122f0a762c
SHA2560fe6a869cf220769a058f8d281f272ef72669e3587673e52b53f3f9650dcf1fc
SHA5128199c967ad813216f2ef3094a7614c9ccc95d35a817fc685cb7823f36cc97f0279bddd0ec0bb8f07ee2445476aaea35548516841ee9cde53a8be395515457799