Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    424s
  • max time network
    459s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 16:34

General

  • Target

    9e4d266fc5103fea30210552a5cea75732f1e93025f8b5fd598562fe8e8fa635.exe

  • Size

    118KB

  • MD5

    ff45cd54f807e15aa5d55c51ad4fc949

  • SHA1

    35d19024bd08b379b3f78d8444acea3ec3932ea4

  • SHA256

    9e4d266fc5103fea30210552a5cea75732f1e93025f8b5fd598562fe8e8fa635

  • SHA512

    c96d261acbf0d1a0e8fd9ca9070d0a443277442b9391fe42070d657c9a270820c554c8176e8d72be3043591ab3763c5590716efa4959301596bdbd1ecc28cabe

  • SSDEEP

    3072:pLWTEiR+gctabvQuKbtG3ftk3j30lQqAB1kO0exnr:pLWiYTQPG3VQya6O0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e4d266fc5103fea30210552a5cea75732f1e93025f8b5fd598562fe8e8fa635.exe
    "C:\Users\Admin\AppData\Local\Temp\9e4d266fc5103fea30210552a5cea75732f1e93025f8b5fd598562fe8e8fa635.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Users\Admin\AppData\Local\Temp\9e4d266fc5103fea30210552a5cea75732f1e93025f8b5fd598562fe8e8fa635.exe
      C:\Users\Admin\AppData\Local\Temp\9e4d266fc5103fea30210552a5cea75732f1e93025f8b5fd598562fe8e8fa635.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Users\Admin\AppData\Roaming\x9el0.exe
        C:\Users\Admin\AppData\Roaming\x9el0.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Users\Admin\AppData\Roaming\x9el0.exe
          C:\Users\Admin\AppData\Roaming\x9el0.exe
          4⤵
          • Executes dropped EXE
          PID:1788
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 292
          4⤵
          • Program crash
          PID:4700
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 292
          4⤵
          • Program crash
          PID:2696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 292
      2⤵
      • Program crash
      PID:4928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 292
      2⤵
      • Program crash
      PID:4696
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 928 -ip 928
    1⤵
      PID:4704
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 1480 -ip 1480
      1⤵
        PID:2092

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\x9el0.exe

        Filesize

        118KB

        MD5

        db6e6edac3662e234e769047efc8d9d8

        SHA1

        b357e499125798d6520c6174ca5fa4e90558d012

        SHA256

        deefa6bbec92802e8ff9f2168972bf380a4ff4418842dd70e9ab65e19065af42

        SHA512

        59dc752dcf859c5e88796af6bb3c303fa6cadb2830fa8643a8ccc06798e02f828a5b4533a10026e5fd5b10b21415d804c54d95c43e47d0e3a45646a5d6d4592e

      • C:\Users\Admin\AppData\Roaming\x9el0.exe

        Filesize

        118KB

        MD5

        db6e6edac3662e234e769047efc8d9d8

        SHA1

        b357e499125798d6520c6174ca5fa4e90558d012

        SHA256

        deefa6bbec92802e8ff9f2168972bf380a4ff4418842dd70e9ab65e19065af42

        SHA512

        59dc752dcf859c5e88796af6bb3c303fa6cadb2830fa8643a8ccc06798e02f828a5b4533a10026e5fd5b10b21415d804c54d95c43e47d0e3a45646a5d6d4592e

      • C:\Users\Admin\AppData\Roaming\x9el0.exe

        Filesize

        118KB

        MD5

        db6e6edac3662e234e769047efc8d9d8

        SHA1

        b357e499125798d6520c6174ca5fa4e90558d012

        SHA256

        deefa6bbec92802e8ff9f2168972bf380a4ff4418842dd70e9ab65e19065af42

        SHA512

        59dc752dcf859c5e88796af6bb3c303fa6cadb2830fa8643a8ccc06798e02f828a5b4533a10026e5fd5b10b21415d804c54d95c43e47d0e3a45646a5d6d4592e

      • memory/1788-144-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/1788-145-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/1788-146-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4828-135-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4828-134-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4828-143-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4828-133-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB