Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    109s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2023, 11:33

General

  • Target

    03731599.exe

  • Size

    460KB

  • MD5

    6df4109027cf0cdb396aa7e8cb00306e

  • SHA1

    b677cc1b123fa8a5f81ad082b79f80b10d2a3efd

  • SHA256

    b99d0a2610e65b8ab1e10b959b15b25c07124b4f8761a71b99aa002affe6d6e4

  • SHA512

    c2a1547f4e8019308ea948283f56fb6d1faea62587c100c2e374361a74e380ee749c185ab4a4b3834fd611ae5b96a099955e8b2c827262d5870fc4e43c9ae280

  • SSDEEP

    12288:+5SBXNJ5TKooCJPV7rZPDI/iz0hbtsODTJ:+5i0ozZJrpz0T

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3144
      • C:\Users\Admin\AppData\Local\Temp\03731599.exe
        "C:\Users\Admin\AppData\Local\Temp\03731599.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 748
          3⤵
          • Program crash
          PID:1960
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:4976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1848 -ip 1848
      1⤵
        PID:3524

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1848-148-0x0000000000400000-0x0000000002D1A000-memory.dmp

        Filesize

        41.1MB

      • memory/1848-135-0x0000000002E10000-0x0000000002E17000-memory.dmp

        Filesize

        28KB

      • memory/1848-136-0x0000000004CB0000-0x00000000050B0000-memory.dmp

        Filesize

        4.0MB

      • memory/1848-137-0x0000000004CB0000-0x00000000050B0000-memory.dmp

        Filesize

        4.0MB

      • memory/1848-134-0x0000000004940000-0x00000000049B0000-memory.dmp

        Filesize

        448KB

      • memory/1848-139-0x0000000004BB0000-0x0000000004BE6000-memory.dmp

        Filesize

        216KB

      • memory/1848-146-0x0000000004BB0000-0x0000000004BE6000-memory.dmp

        Filesize

        216KB

      • memory/1848-145-0x0000000000400000-0x0000000002D1A000-memory.dmp

        Filesize

        41.1MB

      • memory/4976-150-0x000001C2498C0000-0x000001C2498C7000-memory.dmp

        Filesize

        28KB

      • memory/4976-155-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-138-0x000001C247850000-0x000001C247853000-memory.dmp

        Filesize

        12KB

      • memory/4976-151-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-152-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-153-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-154-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-149-0x000001C247850000-0x000001C247853000-memory.dmp

        Filesize

        12KB

      • memory/4976-157-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-158-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-159-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-160-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-161-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB

      • memory/4976-162-0x00007FF499880000-0x00007FF4999AD000-memory.dmp

        Filesize

        1.2MB