Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 15:17

General

  • Target

    afb7497a86e75694137c68011672ef880841f4c2e590db02b50608632ebe9da4.exe

  • Size

    1.2MB

  • MD5

    7be5a51b1b26f2fc72fd675459352a1f

  • SHA1

    8da95c4dd6a9f5585ec3a518eee832aa9ef32180

  • SHA256

    afb7497a86e75694137c68011672ef880841f4c2e590db02b50608632ebe9da4

  • SHA512

    616b918430d76c19428929eb100acba2780b37e3a86f178bbe95c1cc942348135e1fc4cac39323fb6b4a1e18f9e80fa5831b2ef03d96b0605b4ddc7473d5e076

  • SSDEEP

    24576:sow6n7BHAnzCcZPSt3f0KthR3SJOk1Zb0ZpFvuS+Yk8vR1+0F8kmfXu:hRBgnWcZpKLNSNt+UX8vR1+0OFfu

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afb7497a86e75694137c68011672ef880841f4c2e590db02b50608632ebe9da4.exe
    "C:\Users\Admin\AppData\Local\Temp\afb7497a86e75694137c68011672ef880841f4c2e590db02b50608632ebe9da4.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3452
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 376
      2⤵
      • Program crash
      PID:4852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 448
      2⤵
      • Program crash
      PID:2100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3452 -ip 3452
    1⤵
      PID:3648
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3452 -ip 3452
      1⤵
        PID:1360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3452-132-0x0000000000400000-0x000000000064C000-memory.dmp

        Filesize

        2.3MB

      • memory/3452-133-0x0000000000400000-0x000000000064C000-memory.dmp

        Filesize

        2.3MB

      • memory/3452-134-0x00000000025F0000-0x0000000002628000-memory.dmp

        Filesize

        224KB

      • memory/3452-135-0x0000000000400000-0x000000000064C000-memory.dmp

        Filesize

        2.3MB

      • memory/3452-136-0x00000000025F0000-0x0000000002628000-memory.dmp

        Filesize

        224KB

      • memory/3452-137-0x0000000000400000-0x000000000064C000-memory.dmp

        Filesize

        2.3MB