Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 16:50

General

  • Target

    f8494aadaa2fa9ef42b9376a82c00dd0.exe

  • Size

    2.0MB

  • MD5

    f8494aadaa2fa9ef42b9376a82c00dd0

  • SHA1

    910380a09a3c1941d3796f9ed5c04f0876356003

  • SHA256

    22ea5a6766623b8f727d45d70a75e10c5dc27c1dbdfb6dc1de1325497ed1ece6

  • SHA512

    4f55a9f31c1c56e4af21e2da521779fa68c94046339504b734a87d955fa12de51b7c358c1e6132eecc13529f0c8443d66dcee129466d992c0117388cbf462681

  • SSDEEP

    49152:fZxW/k+JlcakLz0ibq6yqhAP6xAnQZbs5MUX1jvmacakLz0ibq6yqh:fZxWFJlcakcibiqh26eQZbeMqZmacakh

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8494aadaa2fa9ef42b9376a82c00dd0.exe
    "C:\Users\Admin\AppData\Local\Temp\f8494aadaa2fa9ef42b9376a82c00dd0.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\AppData\Local\Temp\f8494aadaa2fa9ef42b9376a82c00dd0.exe
      C:\Users\Admin\AppData\Local\Temp\f8494aadaa2fa9ef42b9376a82c00dd0.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f8494aadaa2fa9ef42b9376a82c00dd0.exe" /TN qPTTkyZ9c33c /F
        3⤵
        • Creates scheduled task(s)
        PID:2016
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN qPTTkyZ9c33c > C:\Users\Admin\AppData\Local\Temp\pFlAdD.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN qPTTkyZ9c33c
          4⤵
            PID:400
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 604
          3⤵
          • Program crash
          PID:1068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 672
          3⤵
          • Program crash
          PID:4032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 764
          3⤵
          • Program crash
          PID:3940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 768
          3⤵
          • Program crash
          PID:1324
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4364 -ip 4364
      1⤵
        PID:3464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4364 -ip 4364
        1⤵
          PID:1212
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4364 -ip 4364
          1⤵
            PID:1944
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4364 -ip 4364
            1⤵
              PID:4512

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\f8494aadaa2fa9ef42b9376a82c00dd0.exe

              Filesize

              443KB

              MD5

              a37b1e009b3fbb045488c8a581b7b04b

              SHA1

              4bab5f0f801a835af11c5dee2903516b142c7773

              SHA256

              43f3d02c654bdd2a07844b42bbd12c7368f2dc43eae86ddbbc4d19097897e5a7

              SHA512

              a3bad88e3f3d8490b7541f96f4e6601b9cca1cf0a5c8ce939f683e95196af41e4bbea935dfc6af5c3756a2f117f8c0c2ab1f0729434143010dcdd68db8550fdc

            • C:\Users\Admin\AppData\Local\Temp\pFlAdD.xml

              Filesize

              1KB

              MD5

              8d62f5cb5f5470bd8e09edac1c71905c

              SHA1

              aeec3878628ff81ab7b1e170ed97afa165527e29

              SHA256

              044359e6a44b58cce7aab4747b426aea72b6340909e58269fcf8c8435b35f70c

              SHA512

              a61289093ccb5c50a4170789e1cbff25df531beb271386ff717d3a6a474d23a2de4a2f065afe93a4d8b26190f93e6d39db9ee2ca05762b90dcf407876fda1bbc

            • memory/1536-0-0x0000000000400000-0x000000000065C000-memory.dmp

              Filesize

              2.4MB

            • memory/1536-2-0x0000000001730000-0x00000000017AE000-memory.dmp

              Filesize

              504KB

            • memory/1536-1-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/1536-13-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/4364-19-0x0000000025000000-0x000000002507E000-memory.dmp

              Filesize

              504KB

            • memory/4364-14-0x0000000000400000-0x000000000065C000-memory.dmp

              Filesize

              2.4MB

            • memory/4364-22-0x0000000000470000-0x00000000004DB000-memory.dmp

              Filesize

              428KB

            • memory/4364-23-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4364-41-0x0000000000400000-0x000000000065C000-memory.dmp

              Filesize

              2.4MB