Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe
Resource
win10v2004-20221111-en
General
-
Target
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe
-
Size
18KB
-
MD5
cf10800f44769adb7fa525144b9bc112
-
SHA1
162e236956778f48dad90b57798e9c3d84059aee
-
SHA256
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
-
SHA512
67b51c9e589016189a95fbc67a7bb7aa77465f514885e3d96424418358582752139e40183962d580ac52ff7629c1d3ff6fb7c7f69d04e95f8d1f1b1f6c338210
-
SSDEEP
384:+qh9iywwHkhoTT45gMkmKk7GY1ISpZWwnU4OF1O:d3iy5NM1kmp7GY1RKwnU4ObO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 652 wualct.exe -
Deletes itself 1 IoCs
pid Process 652 wualct.exe -
Loads dropped DLL 5 IoCs
pid Process 1636 74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe 1636 74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe 1028 WerFault.exe 1028 WerFault.exe 1028 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sudp = "C:\\ProgramData\\wualct.exe" 74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1028 652 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1636 wrote to memory of 652 1636 74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe 28 PID 1636 wrote to memory of 652 1636 74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe 28 PID 1636 wrote to memory of 652 1636 74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe 28 PID 1636 wrote to memory of 652 1636 74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe 28 PID 652 wrote to memory of 1028 652 wualct.exe 30 PID 652 wrote to memory of 1028 652 wualct.exe 30 PID 652 wrote to memory of 1028 652 wualct.exe 30 PID 652 wrote to memory of 1028 652 wualct.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe"C:\Users\Admin\AppData\Local\Temp\74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\ProgramData\wualct.exeC:\ProgramData\wualct.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 5563⤵
- Loads dropped DLL
- Program crash
PID:1028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5cf10800f44769adb7fa525144b9bc112
SHA1162e236956778f48dad90b57798e9c3d84059aee
SHA25674a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
SHA51267b51c9e589016189a95fbc67a7bb7aa77465f514885e3d96424418358582752139e40183962d580ac52ff7629c1d3ff6fb7c7f69d04e95f8d1f1b1f6c338210
-
Filesize
102B
MD52cb8a89c98001f5eac9df73a60b8585e
SHA15e043b6361f728a1fba6f9d86b83064a6304ccdf
SHA256a0ff1440bc77f3c14caf22d2e54e6f350c0c529f7c9cde566c986b94e7eafabe
SHA512eb62e499752dfcd3b6d3ed1f5fbabb912c70b75e116445d0b5683793fdf4dd1a585bf888e9dccb9b0b8434f518ad0333325cf6e568275fd607423df526e406a7
-
Filesize
18KB
MD5cf10800f44769adb7fa525144b9bc112
SHA1162e236956778f48dad90b57798e9c3d84059aee
SHA25674a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
SHA51267b51c9e589016189a95fbc67a7bb7aa77465f514885e3d96424418358582752139e40183962d580ac52ff7629c1d3ff6fb7c7f69d04e95f8d1f1b1f6c338210
-
Filesize
18KB
MD5cf10800f44769adb7fa525144b9bc112
SHA1162e236956778f48dad90b57798e9c3d84059aee
SHA25674a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
SHA51267b51c9e589016189a95fbc67a7bb7aa77465f514885e3d96424418358582752139e40183962d580ac52ff7629c1d3ff6fb7c7f69d04e95f8d1f1b1f6c338210
-
Filesize
18KB
MD5cf10800f44769adb7fa525144b9bc112
SHA1162e236956778f48dad90b57798e9c3d84059aee
SHA25674a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
SHA51267b51c9e589016189a95fbc67a7bb7aa77465f514885e3d96424418358582752139e40183962d580ac52ff7629c1d3ff6fb7c7f69d04e95f8d1f1b1f6c338210
-
Filesize
18KB
MD5cf10800f44769adb7fa525144b9bc112
SHA1162e236956778f48dad90b57798e9c3d84059aee
SHA25674a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
SHA51267b51c9e589016189a95fbc67a7bb7aa77465f514885e3d96424418358582752139e40183962d580ac52ff7629c1d3ff6fb7c7f69d04e95f8d1f1b1f6c338210
-
Filesize
18KB
MD5cf10800f44769adb7fa525144b9bc112
SHA1162e236956778f48dad90b57798e9c3d84059aee
SHA25674a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
SHA51267b51c9e589016189a95fbc67a7bb7aa77465f514885e3d96424418358582752139e40183962d580ac52ff7629c1d3ff6fb7c7f69d04e95f8d1f1b1f6c338210