Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 12:24
Behavioral task
behavioral1
Sample
ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe
Resource
win10v2004-20220812-en
General
-
Target
ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe
-
Size
68KB
-
MD5
30c574463f9f674f4e71a1b7a4938bcc
-
SHA1
657a290b87f05a349e6160ef5661adc29995510a
-
SHA256
ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1
-
SHA512
0160778e994754a4f464853121f7ff871092a5adaf11c80d89d52c6c3f31c3d7ec8bbbabb38353e1ba472fdabae8a131a8d059b7c1f7704578a619f6b45444f3
-
SSDEEP
1536:T4yyccESh3ojgp6vtboEscpbXvpDBzjlFV87Gi7j:EDca3o8YJoxWDp1tFV8L7j
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2028-55-0x0000000000020000-0x0000000000043000-memory.dmp upx -
Enumerates connected drives 3 TTPs 5 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe File opened (read-only) \??\I: ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe File opened (read-only) \??\G: ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe File opened (read-only) \??\Z: ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe File opened (read-only) \??\E: ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1192 2028 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1192 2028 ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe 28 PID 2028 wrote to memory of 1192 2028 ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe 28 PID 2028 wrote to memory of 1192 2028 ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe 28 PID 2028 wrote to memory of 1192 2028 ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe"C:\Users\Admin\AppData\Local\Temp\ed150f7e8ed24fa7af2b7bf8aba54fb78d4c1590323535fdd5928ebad497d1e1.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 2762⤵
- Program crash
PID:1192
-