Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 17:02
Behavioral task
behavioral1
Sample
af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe
Resource
win10v2004-20230703-en
General
-
Target
af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe
-
Size
776KB
-
MD5
170ede1de6420f4658be44999c50dd8a
-
SHA1
0ca710b590bd70731bb133f2f617b92bcaeeac9d
-
SHA256
af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c
-
SHA512
e52bed65a5cffe461dedc7786d9f2c3c25e4a70df65b5cbaf017cd03fb5a8ecc7f9030efef86326b6b7734027d8126a28b4c2189df801637ee861cef55680014
-
SSDEEP
12288:/0jYaiAP/J5sdS6wkq8O+595AU4iDetY0J4+1WNxinSj+BRs1Es58iJ64N2h+j9b:/0jxiYsWkZLD5AUTetW+IakFj64tZ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4812-133-0x0000000000400000-0x000000000067C000-memory.dmp upx behavioral2/memory/4812-190-0x0000000000400000-0x000000000067C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4348 4812 WerFault.exe 81 2140 4812 WerFault.exe 81 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4812 af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4812 af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4812 af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe 4812 af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe 4812 af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe 4812 af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe 4812 af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe 4812 af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe"C:\Users\Admin\AppData\Local\Temp\af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 27522⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 28042⤵
- Program crash
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4812 -ip 48121⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4812 -ip 48121⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51B
MD52fe6a9ac8d1b8aa4868ecb32e5967664
SHA1e014dc4278458812fac60ba5cea88a1647a0bca8
SHA256f9b9c509d895420f3e54aa226a4eea13bc4f7275860228e837bb8e954c3db88a
SHA5128513eb6e149241fa9434785994a20973ca1d1c049d33c0b4c78ede6b5518e3a1efaf14f55d4ade8847a30067c2cd4a1a657638d7aa4f2cb36ae35b33c595379d
-
Filesize
51B
MD57f3caf47dde94a9684497dfe2aaad46d
SHA13ad5bc979213d4f95a5585d73f9786f3e9730242
SHA256afcaa0eb594a76bcae5ef45151156d71ff070c198f372f09c3cacc4caffc1d21
SHA512a5a40534a9ca46ae6c9bc5dda1574f6166cce8228ecb88802f91c1105bbde2c7546edf492deff4d3a3836adb5584a2e2f51accdcdd5eea476db3c87ba3d64e7e
-
Filesize
84B
MD5ed87ed2d66dbbb49f9510dccbefb8e87
SHA1a839b0e28830da2fa1119d6027a1d837c2218566
SHA256cc29c6cac1d821b475723c0f2e625c9b414ceeea49f8c669c380000e73773846
SHA51215d61774597e9a28250bfbcade0fc207019c133284481f44c954203bdbfc918a5fde2e9780be956da1242a64b63257851de75538a2c544461bbad31a839cf902