Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe
Resource
win10v2004-20230831-en
General
-
Target
1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe
-
Size
1.3MB
-
MD5
d000e2d416117d102fba25062eb93f5d
-
SHA1
65f45c27cd05fa1e02283c99cd52f1f279eb1308
-
SHA256
1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d
-
SHA512
1cd21a1505145963bb91e7c7ce5f2aabef852a7a3ab0952547a13d32a7b89dc049851023dac8c44167eb911a73e3b3677c1b8a39595d1dbdb694eabdd50cf950
-
SSDEEP
24576:UcvaDKBaZSeA/+RvgswfkNoKUCuO5az/rhPV52oT:U1Q2RgkNo7Fz/VPVt
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3692 404 WerFault.exe 83 2304 404 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe Token: SeIncBasePriorityPrivilege 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe 404 1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe"C:\Users\Admin\AppData\Local\Temp\1f67013608ff75f6cfb5a6de8e98214db0a454f0138405c122d96271c0e3021d.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 7522⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 20202⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 404 -ip 4041⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 404 -ip 4041⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5fc4187c8dcf4dfdcd2078746368a0f3c
SHA1e6aacd178ae25052626cd571762729d5c9e2c64a
SHA25613fba2fff3b92e8e0cc0b5a40fb32c08067b1002def941d319dbfc8443df3e83
SHA512b39c7407d1bc6db829e05f31a91951e928a7de15da66bb8103f3521044bc453326e7ab16aae2bf216c28ef40f0a5fdf191dce7fe7a2e58556e006532a4df0646