Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 01:00
Behavioral task
behavioral1
Sample
a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe
Resource
win10v2004-20220812-en
General
-
Target
a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe
-
Size
1.1MB
-
MD5
00038564185227f799f179cdf7b3aefd
-
SHA1
4e44547a2e51a374fbc247aad440590b36898f7f
-
SHA256
a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60
-
SHA512
66ce046f01e4b9f151f42d91cede72ada04329317581ad9a057fba4176e49fff07b593bff016bd8adb66e626b6934a7bf870e233f7115cbec33b7308e1c40a74
-
SSDEEP
24576:W9kY7vgEeJPq34ZTdQXtnqhz2cOmsRQsmjmPOIzAFMn0kv:W9kYuZTdAtS2lpSovcF8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5056 e573940.exe -
resource yara_rule behavioral2/memory/2568-132-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral2/files/0x000300000000072b-134.dat upx behavioral2/files/0x000300000000072b-135.dat upx behavioral2/memory/5056-136-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral2/memory/2568-137-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral2/memory/5056-138-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral2/memory/5056-140-0x0000000000400000-0x00000000007AC000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 848 5056 WerFault.exe 84 3304 5056 WerFault.exe 84 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2568 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 2568 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 5056 e573940.exe 5056 e573940.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2568 wrote to memory of 5056 2568 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 84 PID 2568 wrote to memory of 5056 2568 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 84 PID 2568 wrote to memory of 5056 2568 a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe 84 PID 5056 wrote to memory of 848 5056 e573940.exe 86 PID 5056 wrote to memory of 848 5056 e573940.exe 86 PID 5056 wrote to memory of 848 5056 e573940.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe"C:\Users\Admin\AppData\Local\Temp\a4492e78fa8944816c463722991d4b97118178e2125f702f1523e3a9a06b8c60.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e573940.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e573940.exe 2405973122⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 20443⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 20443⤵
- Program crash
PID:3304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 5056 -ip 50561⤵PID:4284
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5085157de6d509a91347cbdad68e35756
SHA1aff0d6e67eb1e515094b27519b5f62248a0cb8f2
SHA2566a0ccd3c879c00865ca88b62d9fc99f4d60c42222e09bf30888c4264fa593279
SHA5125a1d5255d98f0603f97652cceb6e74cd161a4c31e6527cc94ada56535bf58de0933638fa323da79f3487fe87e1880c519183a32a3c877f6bb198b0a414185417
-
Filesize
1.1MB
MD5085157de6d509a91347cbdad68e35756
SHA1aff0d6e67eb1e515094b27519b5f62248a0cb8f2
SHA2566a0ccd3c879c00865ca88b62d9fc99f4d60c42222e09bf30888c4264fa593279
SHA5125a1d5255d98f0603f97652cceb6e74cd161a4c31e6527cc94ada56535bf58de0933638fa323da79f3487fe87e1880c519183a32a3c877f6bb198b0a414185417