Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 01:00
Behavioral task
behavioral1
Sample
a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe
Resource
win10v2004-20220812-en
General
-
Target
a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe
-
Size
1.1MB
-
MD5
00038564185227f799f179cdf7b3aefd
-
SHA1
4e44547a2e51a374fbc247aad440590b36898f7f
-
SHA256
a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60
-
SHA512
66ce046f01e4b9f151f42d91cede72ada04329317581ad9a057fba4176e49fff07b593bff016bd8adb66e626b6934a7bf870e233f7115cbec33b7308e1c40a74
-
SSDEEP
24576:W9kY7vgEeJPq34ZTdQXtnqhz2cOmsRQsmjmPOIzAFMn0kv:W9kYuZTdAtS2lpSovcF8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 628 6bf69f.exe -
resource yara_rule behavioral1/files/0x00090000000122f9-55.dat upx behavioral1/files/0x00090000000122f9-56.dat upx behavioral1/files/0x00090000000122f9-58.dat upx behavioral1/memory/1720-60-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/628-62-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/1720-63-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/files/0x00090000000122f9-68.dat upx behavioral1/files/0x00090000000122f9-67.dat upx behavioral1/files/0x00090000000122f9-66.dat upx behavioral1/files/0x00090000000122f9-65.dat upx behavioral1/files/0x00090000000122f9-70.dat upx behavioral1/files/0x00090000000122f9-69.dat upx behavioral1/files/0x00090000000122f9-71.dat upx -
Loads dropped DLL 9 IoCs
pid Process 1720 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 1720 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 540 628 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 6bf69f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 6bf69f.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1720 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 1720 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 628 6bf69f.exe 628 6bf69f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 628 1720 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 27 PID 1720 wrote to memory of 628 1720 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 27 PID 1720 wrote to memory of 628 1720 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 27 PID 1720 wrote to memory of 628 1720 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 27 PID 628 wrote to memory of 540 628 6bf69f.exe 30 PID 628 wrote to memory of 540 628 6bf69f.exe 30 PID 628 wrote to memory of 540 628 6bf69f.exe 30 PID 628 wrote to memory of 540 628 6bf69f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe"C:\Users\Admin\AppData\Local\Temp\a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6bf69f.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6bf69f.exe 70755032⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 14603⤵
- Loads dropped DLL
- Program crash
PID:540
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5
-
Filesize
1.1MB
MD5ca7564d62341ea896509caf2a9cde128
SHA18250da4c761595ea46c4e088920185ed0efe2753
SHA256950f48b394132c184ec5c1b12c90243413f1cdfe34111f53b1644a4bb12f3dd7
SHA512b19c9cb89265df5bf97e6d3c1b531bb51cff5c08c0143429c1e71cc2dc547ab903c1363ed17d2b724bb65732a16d02196982aeb3b1a96925add684c663fee9d5