Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe
Resource
win10v2004-20230703-en
General
-
Target
4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe
-
Size
1.6MB
-
MD5
353dcfecd8e56fdb5cb4d9d94ed39769
-
SHA1
df4c974adcac6217562f88efc4ef6ffd7db70e71
-
SHA256
4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c
-
SHA512
74b94c11e4fa9da5d6fc26746a614628c8ec995d21e88593c671155a1b27a3e5e53114e07e3bfab578bd6358b3f7801708c51d816a64390656c48b7165e76975
-
SSDEEP
24576:eWDKWJHvxfwLG76Pl7Sx7Zme5Eyt5fnUNtqyO0DbY1XQfVh:eHLG5x7BeyDnUrpUM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2440-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2440-44-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 5012 2440 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2440 4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe 2440 4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2440 4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe 2440 4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe 2440 4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe"C:\Users\Admin\AppData\Local\Temp\4b4b019c1f495c7ac508e0351fc1e6a13f4f549ac607bc4cc101f4dae002d51c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 7522⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2440 -ip 24401⤵PID:60