Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe
Resource
win10v2004-20221111-en
General
-
Target
ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe
-
Size
132KB
-
MD5
a0dbec02e61a0cb615463daaabca4004
-
SHA1
853898dfb4262fbfbb60edbcb6fb9f44d1c14220
-
SHA256
ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237
-
SHA512
e1f08cb4dccea95e11a340bc08426a8913c676f242400ce1fb5dba2cb2668147ffb4cab559edbb4a4670a2f560ab19c868ce674ba687f085c47adc44fdafb4fc
-
SSDEEP
1536:yd+zAUTXwbuVjaajd21dhOfct0G/yZjigL0q3jBnOgOtOTM/jh81ASGLUI5p1kSQ:YsDwbWxZfct0G/uFjxOHImjCcZXaS4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3200 taskhost.exe 752 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1396 set thread context of 2632 1396 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 82 PID 3200 set thread context of 752 3200 taskhost.exe 87 -
Program crash 2 IoCs
pid pid_target Process procid_target 1556 1396 WerFault.exe 81 2324 3200 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1396 wrote to memory of 2632 1396 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 82 PID 1396 wrote to memory of 2632 1396 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 82 PID 1396 wrote to memory of 2632 1396 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 82 PID 1396 wrote to memory of 2632 1396 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 82 PID 1396 wrote to memory of 2632 1396 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 82 PID 2632 wrote to memory of 3200 2632 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 86 PID 2632 wrote to memory of 3200 2632 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 86 PID 2632 wrote to memory of 3200 2632 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 86 PID 3200 wrote to memory of 752 3200 taskhost.exe 87 PID 3200 wrote to memory of 752 3200 taskhost.exe 87 PID 3200 wrote to memory of 752 3200 taskhost.exe 87 PID 3200 wrote to memory of 752 3200 taskhost.exe 87 PID 3200 wrote to memory of 752 3200 taskhost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe"C:\Users\Admin\AppData\Local\Temp\ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exeC:\Users\Admin\AppData\Local\Temp\ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 3084⤵
- Program crash
PID:2324
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 2842⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1396 -ip 13961⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3200 -ip 32001⤵PID:2568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD54a6018e354be2f95949143ba93d46836
SHA15c286fd9d2af69fcc28da09d4258160ed0d9a641
SHA256a38ed8f395edc846bfdfbd5abaef0b05acb3d962d6c5b9abd5b5f8b7fe62463d
SHA512f512ce9f2822ff23fc04c36c0a864c3ea66b19e7050017206e2b4555034ab663cf62396d799dc42e30913d2da355029621c8bc65b33c47e665de48c95cc35b92
-
Filesize
132KB
MD54a6018e354be2f95949143ba93d46836
SHA15c286fd9d2af69fcc28da09d4258160ed0d9a641
SHA256a38ed8f395edc846bfdfbd5abaef0b05acb3d962d6c5b9abd5b5f8b7fe62463d
SHA512f512ce9f2822ff23fc04c36c0a864c3ea66b19e7050017206e2b4555034ab663cf62396d799dc42e30913d2da355029621c8bc65b33c47e665de48c95cc35b92
-
Filesize
132KB
MD54a6018e354be2f95949143ba93d46836
SHA15c286fd9d2af69fcc28da09d4258160ed0d9a641
SHA256a38ed8f395edc846bfdfbd5abaef0b05acb3d962d6c5b9abd5b5f8b7fe62463d
SHA512f512ce9f2822ff23fc04c36c0a864c3ea66b19e7050017206e2b4555034ab663cf62396d799dc42e30913d2da355029621c8bc65b33c47e665de48c95cc35b92