Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
193s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 01:00
Behavioral task
behavioral1
Sample
8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe
Resource
win10v2004-20221111-en
General
-
Target
8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe
-
Size
1.1MB
-
MD5
004e8683b9c031550d365e1a39fcc6a5
-
SHA1
91040dd8d47613b14ffe4a2c8654caaa80cab60e
-
SHA256
8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821
-
SHA512
405561b75f5f0c172526625b5dec35f08c32a23606e1697ba134fbe768f8decf480ab2973ff106d17fa1cd4c23fb5a248efc70dc84558885230a4d2f6e6830e9
-
SSDEEP
24576:W9kY7vgEeJPq34ZTdQXtnqhz2cOmsRQsmjmPOIzAFMn0kr:W9kYuZTdAtS2lpSovcFI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3888 e5783f5.exe -
resource yara_rule behavioral2/memory/3496-132-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral2/files/0x0006000000022e08-135.dat upx behavioral2/files/0x0006000000022e08-134.dat upx behavioral2/memory/3888-136-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral2/memory/3496-137-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral2/memory/3888-138-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral2/memory/3888-139-0x0000000000400000-0x00000000007AC000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4532 3888 WerFault.exe 86 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3496 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 3496 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 3888 e5783f5.exe 3888 e5783f5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3496 wrote to memory of 3888 3496 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 86 PID 3496 wrote to memory of 3888 3496 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 86 PID 3496 wrote to memory of 3888 3496 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe"C:\Users\Admin\AppData\Local\Temp\8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5783f5.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5783f5.exe 2406164532⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 21123⤵
- Program crash
PID:4532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3888 -ip 38881⤵PID:1592
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5ae04db15eb1d2787083dc27666987c66
SHA1a726308485427a34ef14e84b51a02edabca5e5d7
SHA256cfa56585bd0d4b3427da92ea1f84132f19cd6a8ea6e78f05b76bb39c232d2f4a
SHA512a20b2cdf8772dda5019fc12da855b5ad7451d79514e3ea49d15f368c0f4618e6b35046474db045958012033122f608e5847fea719ba8d80f056cc1dceed2b4bd
-
Filesize
1.1MB
MD5ae04db15eb1d2787083dc27666987c66
SHA1a726308485427a34ef14e84b51a02edabca5e5d7
SHA256cfa56585bd0d4b3427da92ea1f84132f19cd6a8ea6e78f05b76bb39c232d2f4a
SHA512a20b2cdf8772dda5019fc12da855b5ad7451d79514e3ea49d15f368c0f4618e6b35046474db045958012033122f608e5847fea719ba8d80f056cc1dceed2b4bd