Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe
Resource
win10v2004-20220812-en
General
-
Target
b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe
-
Size
132KB
-
MD5
972c08e8b341ef46a0d7fb453890839c
-
SHA1
8924bf0ee6444ecdf0e62cc228d394ef132a2370
-
SHA256
b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82
-
SHA512
d496a0b6df840e76775822433ebdf1b9ca805fbc3d93e7c50708459698569f0e070cede4aae0073faad00d35a081f4887c4f916fcdd5626f5265d21d5d32f09d
-
SSDEEP
1536:uvABbebP+9jC8Nf4FctKDNFBQjURgSIXlY4bP5rX5OXSRAKvSr9jSwnf:rbroFctmKcGY+xrJOiRANx2wn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4560 taskhost.exe 1684 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\taskhost.exe" taskhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4624 set thread context of 1848 4624 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 76 PID 4560 set thread context of 1684 4560 taskhost.exe 81 -
Program crash 2 IoCs
pid pid_target Process procid_target 1340 4624 WerFault.exe 75 3996 4560 WerFault.exe 79 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4624 wrote to memory of 1848 4624 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 76 PID 4624 wrote to memory of 1848 4624 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 76 PID 4624 wrote to memory of 1848 4624 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 76 PID 4624 wrote to memory of 1848 4624 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 76 PID 4624 wrote to memory of 1848 4624 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 76 PID 1848 wrote to memory of 4560 1848 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 79 PID 1848 wrote to memory of 4560 1848 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 79 PID 1848 wrote to memory of 4560 1848 b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe 79 PID 4560 wrote to memory of 1684 4560 taskhost.exe 81 PID 4560 wrote to memory of 1684 4560 taskhost.exe 81 PID 4560 wrote to memory of 1684 4560 taskhost.exe 81 PID 4560 wrote to memory of 1684 4560 taskhost.exe 81 PID 4560 wrote to memory of 1684 4560 taskhost.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe"C:\Users\Admin\AppData\Local\Temp\b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exeC:\Users\Admin\AppData\Local\Temp\b48bc4afd0de7142cad22adfa148b57b7c70cf4f99e59b2c518675eab56b5a82.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 3084⤵
- Program crash
PID:3996
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 3082⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4624 -ip 46241⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4560 -ip 45601⤵PID:4968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5c85faceb195e59c8c09d1db03fb578bb
SHA19ce4bc9668941b26e3a616594535ec2fd7a59dad
SHA25624f9a21fb3bf4585878503a4289ba9511e9847669d3eac23d4c01e521398bb76
SHA512668d3b02fd069a1be26847cbd00381ec222ffcaed868db65ef69dc3d026dd9266199416b37ae7589c5792403e50fc09793b46386cbbd700512fe6c25e9388f41
-
Filesize
132KB
MD5c85faceb195e59c8c09d1db03fb578bb
SHA19ce4bc9668941b26e3a616594535ec2fd7a59dad
SHA25624f9a21fb3bf4585878503a4289ba9511e9847669d3eac23d4c01e521398bb76
SHA512668d3b02fd069a1be26847cbd00381ec222ffcaed868db65ef69dc3d026dd9266199416b37ae7589c5792403e50fc09793b46386cbbd700512fe6c25e9388f41
-
Filesize
132KB
MD5c85faceb195e59c8c09d1db03fb578bb
SHA19ce4bc9668941b26e3a616594535ec2fd7a59dad
SHA25624f9a21fb3bf4585878503a4289ba9511e9847669d3eac23d4c01e521398bb76
SHA512668d3b02fd069a1be26847cbd00381ec222ffcaed868db65ef69dc3d026dd9266199416b37ae7589c5792403e50fc09793b46386cbbd700512fe6c25e9388f41