Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
177s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe
Resource
win10v2004-20220812-en
General
-
Target
e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe
-
Size
804KB
-
MD5
3421a71784bf67bf04e837dc48ec35cb
-
SHA1
dd713e69db1bcf63990a5f6be48b5ced2f9fbc94
-
SHA256
e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed
-
SHA512
0e9788db9784520536d3b6ddc9f3876acb7bb1a2b8f8852fe22e0f55f8f027bf04cd349f8941a31d3cb434f7c2050f5fd27d87e71fa64b1cb2fc4ebb26a606c7
-
SSDEEP
12288:9ODS6yD62Yuoj+WcWYTzlFbo8GYUW/Cvx/9gs/p3bC2kibkDciyUA:9wS6M65uZPDc9WKVXW2JF5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4824 migamix2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ADVAPI32.dll e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe File opened for modification C:\Windows\SysWOW64\COMCTL32.dll e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe File opened for modification C:\Windows\SysWOW64\VERSION.dll e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4128 4824 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4824 4180 e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe 82 PID 4180 wrote to memory of 4824 4180 e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe 82 PID 4180 wrote to memory of 4824 4180 e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe"C:\Users\Admin\AppData\Local\Temp\e940e6998f0991b5f74b8845945e290c502360f1c94a053ea0cea75da4bd62ed.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\migamix2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\migamix2.exe2⤵
- Executes dropped EXE
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 5483⤵
- Program crash
PID:4128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4824 -ip 48241⤵PID:2796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD56d51c2fb222c955c3a97c83690ff7069
SHA1fc536f551c05d586b4b46c91b2a72b636583b87c
SHA25632df40d7df3f38be14f89ba9a23cf424a71b1ca5841f790eda326d1031ae87ff
SHA512d415f72d9c87310b3936a89f1beee08b7e662bc1e8f5fdf8a2bf381fef6f6f2b2d5a5a88bd9644d1b6763b7e55f0ced76ffea4e04f69c75a5e39835f2b786f42
-
Filesize
70KB
MD56d51c2fb222c955c3a97c83690ff7069
SHA1fc536f551c05d586b4b46c91b2a72b636583b87c
SHA25632df40d7df3f38be14f89ba9a23cf424a71b1ca5841f790eda326d1031ae87ff
SHA512d415f72d9c87310b3936a89f1beee08b7e662bc1e8f5fdf8a2bf381fef6f6f2b2d5a5a88bd9644d1b6763b7e55f0ced76ffea4e04f69c75a5e39835f2b786f42