Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe
Resource
win10v2004-20231023-en
General
-
Target
b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe
-
Size
2.0MB
-
MD5
58eb1771504e5dc3fad0d7339c8ae1d8
-
SHA1
29b8f05728ca59d82927458097edae84f82cfc5c
-
SHA256
b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc
-
SHA512
5f9d5b8bdd9d26e6570b24f168b41d29326aefb201468890b8b1cfccaed166418c7c8e26bbf7bc9fc1bedd480b8783bdb474fbe0eae8a7c237a8c5a24b4a9133
-
SSDEEP
49152:NSE8T6ifjz5uLN8J24pkypkkkXUzqnLnteAVD/Oo2TC33GdQLNR:0E8Frz88YkAV/yTaWaR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1424 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe -
Executes dropped EXE 1 IoCs
pid Process 1424 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 12 IoCs
pid pid_target Process procid_target 1636 1624 WerFault.exe 84 5008 1424 WerFault.exe 95 4796 1424 WerFault.exe 95 756 1424 WerFault.exe 95 5012 1424 WerFault.exe 95 2456 1424 WerFault.exe 95 3796 1424 WerFault.exe 95 3996 1424 WerFault.exe 95 4292 1424 WerFault.exe 95 1260 1424 WerFault.exe 95 4428 1424 WerFault.exe 95 3964 1424 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe 1424 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1624 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1424 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1424 1624 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe 95 PID 1624 wrote to memory of 1424 1624 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe 95 PID 1624 wrote to memory of 1424 1624 b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe"C:\Users\Admin\AppData\Local\Temp\b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 3442⤵
- Program crash
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exeC:\Users\Admin\AppData\Local\Temp\b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 3443⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 6363⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 6323⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 6323⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 7203⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 9043⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 14083⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 14723⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 14883⤵
- Program crash
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 14803⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 16803⤵
- Program crash
PID:3964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1624 -ip 16241⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1424 -ip 14241⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1424 -ip 14241⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1424 -ip 14241⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1424 -ip 14241⤵PID:804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1424 -ip 14241⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1424 -ip 14241⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1424 -ip 14241⤵PID:1192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1424 -ip 14241⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1424 -ip 14241⤵PID:60
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1424 -ip 14241⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1424 -ip 14241⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b7bb41cc45beeeda3adf04ec2ccf000de0dcf8aa27910bd0630dce3f4295aefc.exe
Filesize2.0MB
MD5de8c9b9af4940b4766d791002f5bd380
SHA14663631b3a247885186c36be45ff27f1a6ea8bd7
SHA256ad7e0a52e0a80959e6f48de829e0d82a7e4eff57f0c034d27e55dda2b8bcbb56
SHA5126c79f0de20fc0bd9c3a544df747a0181f0bbd4a971f083994581430a9ede238589fd3a5e1b0ba06552511269e068cb544a4c1af6fdd93c81e5cb9924477c6040