Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 02:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe
Resource
win10v2004-20230915-en
General
-
Target
714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe
-
Size
912KB
-
MD5
6deb78a5534ff19df00880aba40abbfc
-
SHA1
07ead9e52f2c770758d555363a194ad3222794b8
-
SHA256
714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0
-
SHA512
98b0f81a5ac8e0f44f508578a49cec309ec14b03a969086b39b45df55f41c52b430b5176fa2da351146dfa2110b66d2c3bb864785a93b62f7c495bfa36a95c26
-
SSDEEP
12288:VBY5+TojQNj49ekhsDE1hxBzpDI0F1zqKf66yeD:VBY1jQB4AkGEfx/I0F1zbfPBD
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DcMem\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\e576513.tmp" 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3488 3556 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3556 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 3556 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 3556 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 3556 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3556 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3556 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 3556 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe"C:\Users\Admin\AppData\Local\Temp\714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 8242⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3556 -ip 35561⤵PID:1040
Network
-
Remote address:8.8.8.8:53Request67.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request67.112.168.52.in-addr.arpaIN PTRResponse
-
71 B 157 B 1 1
DNS Request
67.31.126.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
67.112.168.52.in-addr.arpa