Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 13:07

General

  • Target

    862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe

  • Size

    606KB

  • MD5

    0acb3172631f0161d0f1504e44d922df

  • SHA1

    a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

  • SHA256

    862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

  • SHA512

    c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

  • SSDEEP

    1536:xzWu+k+UHW8QkHnmpSbUhhFJrDnhH//pSzrcU:CUFISbUhhFJrDhH/BuI

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe
    "C:\Users\Admin\AppData\Local\Temp\862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe
      "C:\Users\Admin\AppData\Local\Temp\862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Users\Admin\AppData\Roaming\aa89259\aa89259.exe
        "C:\Users\Admin\AppData\Roaming\aa89259\aa89259.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Users\Admin\AppData\Roaming\aa89259\aa89259.exe
          "C:\Users\Admin\AppData\Roaming\aa89259\aa89259.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3624
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\syswow64\explorer.exe"
            5⤵
              PID:3524
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 832
                6⤵
                • Program crash
                PID:4152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3524 -ip 3524
      1⤵
        PID:4028

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\aa89259\aa89259.exe

        Filesize

        606KB

        MD5

        0acb3172631f0161d0f1504e44d922df

        SHA1

        a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

        SHA256

        862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

        SHA512

        c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

      • C:\Users\Admin\AppData\Roaming\aa89259\aa89259.exe

        Filesize

        606KB

        MD5

        0acb3172631f0161d0f1504e44d922df

        SHA1

        a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

        SHA256

        862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

        SHA512

        c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

      • C:\Users\Admin\AppData\Roaming\aa89259\aa89259.exe

        Filesize

        606KB

        MD5

        0acb3172631f0161d0f1504e44d922df

        SHA1

        a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

        SHA256

        862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

        SHA512

        c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

      • memory/3524-151-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/3624-150-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/4180-134-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/4180-136-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/4180-140-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/4744-148-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/4744-142-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/5036-132-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/5036-137-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB