Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe
Resource
win10v2004-20220812-en
General
-
Target
f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe
-
Size
157KB
-
MD5
96e3f8c7566d2e0a9abc560c261d2969
-
SHA1
1ce481a9206eb3cf208cb36018b37882a9f83e64
-
SHA256
f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853
-
SHA512
38a050e67712538123825a86b0439a4d68e91fac1331bf7367825b32cffc503352352b055f284e9aafad1f9a77c99a2acb68b22ff85b69c11253ca44dc1d64e8
-
SSDEEP
3072:TpCjtzxD3F0DcmcIn+STVR8fNdUfZKcsgzG9tniBh5NJ3l:azAcdIVxmzGZ1FzGPnet
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1076 Wderua.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Wderua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\TBXQRHV4KR = "C:\\Windows\\Wderua.exe" Wderua.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe File created C:\Windows\Wderua.exe f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe File opened for modification C:\Windows\Wderua.exe f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main Wderua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International Wderua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe 1076 Wderua.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1940 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 1076 Wderua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1076 1940 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 27 PID 1940 wrote to memory of 1076 1940 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 27 PID 1940 wrote to memory of 1076 1940 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 27 PID 1940 wrote to memory of 1076 1940 f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe"C:\Users\Admin\AppData\Local\Temp\f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\Wderua.exeC:\Windows\Wderua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5b7333f2be977d86a4e4865a208d6eebe
SHA1d8073eb78ca7e3772d5dbecdb51e3311f04f0fdc
SHA25648ecd0acee49748d84cb314640baaefc63f835667a314cb908501dacacf160d1
SHA512144ce5ce8b8bdadeec02cec8e8ee778f258586acd0a5a95d642e47b4eaa8d26fe094bd2485e18045e7dc7ed98edd8b5b75c6dd3af6e8066b372cd6e30c876440
-
Filesize
157KB
MD596e3f8c7566d2e0a9abc560c261d2969
SHA11ce481a9206eb3cf208cb36018b37882a9f83e64
SHA256f9c11ea3939ae5bb3a8198ad90f7b869a121729899980a75fe3105d1d6dd1853
SHA51238a050e67712538123825a86b0439a4d68e91fac1331bf7367825b32cffc503352352b055f284e9aafad1f9a77c99a2acb68b22ff85b69c11253ca44dc1d64e8