Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
313s -
max time network
324s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe
Resource
win10v2004-20221111-en
General
-
Target
baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe
-
Size
96KB
-
MD5
4be1ac9452947d3000daca209972d3cc
-
SHA1
595d3d653581f70b02c9510d76d4b7a70df73e10
-
SHA256
baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01
-
SHA512
2b11d8a798e988aa910d25bbebf55f251f354e659d9a5f4d505dffd9e21f7582c7ca2163fb2971a056fa958a67dc6710382a986348161939cc3a11e37138e0f0
-
SSDEEP
1536:S2dX/KGcry9vASJJ2DbxN4j+s+Ci5d5lIE1ppxRp9bDEvLlIAA31cviZi/:d/V2yVHsQjN+Ci9l5Zp5SIAA3LZi/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2124 taskhost.exe 3820 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4244 set thread context of 3280 4244 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 80 PID 2124 set thread context of 3820 2124 taskhost.exe 85 -
Program crash 2 IoCs
pid pid_target Process procid_target 4704 4244 WerFault.exe 79 2288 2124 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4244 wrote to memory of 3280 4244 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 80 PID 4244 wrote to memory of 3280 4244 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 80 PID 4244 wrote to memory of 3280 4244 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 80 PID 4244 wrote to memory of 3280 4244 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 80 PID 4244 wrote to memory of 3280 4244 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 80 PID 3280 wrote to memory of 2124 3280 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 82 PID 3280 wrote to memory of 2124 3280 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 82 PID 3280 wrote to memory of 2124 3280 baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe 82 PID 2124 wrote to memory of 3820 2124 taskhost.exe 85 PID 2124 wrote to memory of 3820 2124 taskhost.exe 85 PID 2124 wrote to memory of 3820 2124 taskhost.exe 85 PID 2124 wrote to memory of 3820 2124 taskhost.exe 85 PID 2124 wrote to memory of 3820 2124 taskhost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe"C:\Users\Admin\AppData\Local\Temp\baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exeC:\Users\Admin\AppData\Local\Temp\baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:3820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 2964⤵
- Program crash
PID:2288
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 3002⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4244 -ip 42441⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2124 -ip 21241⤵PID:1784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5413eb4df6fca058373d2e07edabb1ef2
SHA171d23bf40422d8b0815d87f4e5f99f47c3912334
SHA2561f28e884b043bbb340954fdd59a8efcf8fc9494cade4f83144fe57e7ac0f142a
SHA512981377df10be155d3da647be0b25c8d6188737b078780b3d2d1a76b75b356b6c4258fa5695aaf5064928ba19d78ee1cf1f7654aefa3cb2793c833661c0418ccc
-
Filesize
96KB
MD5413eb4df6fca058373d2e07edabb1ef2
SHA171d23bf40422d8b0815d87f4e5f99f47c3912334
SHA2561f28e884b043bbb340954fdd59a8efcf8fc9494cade4f83144fe57e7ac0f142a
SHA512981377df10be155d3da647be0b25c8d6188737b078780b3d2d1a76b75b356b6c4258fa5695aaf5064928ba19d78ee1cf1f7654aefa3cb2793c833661c0418ccc
-
Filesize
96KB
MD5413eb4df6fca058373d2e07edabb1ef2
SHA171d23bf40422d8b0815d87f4e5f99f47c3912334
SHA2561f28e884b043bbb340954fdd59a8efcf8fc9494cade4f83144fe57e7ac0f142a
SHA512981377df10be155d3da647be0b25c8d6188737b078780b3d2d1a76b75b356b6c4258fa5695aaf5064928ba19d78ee1cf1f7654aefa3cb2793c833661c0418ccc