Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
b24cd81963b57556ae1bd102ca8ee22a.exe
Resource
win7-20231215-en
General
-
Target
b24cd81963b57556ae1bd102ca8ee22a.exe
-
Size
482KB
-
MD5
b24cd81963b57556ae1bd102ca8ee22a
-
SHA1
e8c36efb9a650fe745dda09415d2a5d0813a7619
-
SHA256
252850b3ba00d2467c4388bc99ce5c14abc78c21aba87062760bbb3d9aaf1df8
-
SHA512
59198a8493f01a61d58eadfec5a96d97b96e0bb78e9a0776638fd02a53b7671e47d53254f2751801c548af65bfdceb7b6928da104ab3a53e35585ec36e5fb158
-
SSDEEP
12288:FC5b6bew+1WDhTk4qFLrcZfk585i5Q9pJfKPV:Q5BwuEZk40cpk585iwpJf
Malware Config
Extracted
amadey
4.14
http://anfesq.com
http://cbinr.com
http://rimakc.ru
-
install_dir
68fd3d7ade
-
install_file
Utsysc.exe
-
strings_key
27ec7fd6f50f63b8af0c1d3deefcc8fe
-
url_paths
/forum/index.php
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation Utsysc.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation b24cd81963b57556ae1bd102ca8ee22a.exe -
Executes dropped EXE 3 IoCs
pid Process 2808 Utsysc.exe 4376 Utsysc.exe 3120 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 36 IoCs
pid pid_target Process procid_target 472 3076 WerFault.exe 89 3268 3076 WerFault.exe 89 2912 3076 WerFault.exe 89 3976 3076 WerFault.exe 89 4188 3076 WerFault.exe 89 3900 3076 WerFault.exe 89 3008 3076 WerFault.exe 89 2880 3076 WerFault.exe 89 892 3076 WerFault.exe 89 3936 3076 WerFault.exe 89 2680 2808 WerFault.exe 115 3528 2808 WerFault.exe 115 2232 2808 WerFault.exe 115 4896 2808 WerFault.exe 115 2876 2808 WerFault.exe 115 2948 2808 WerFault.exe 115 2912 2808 WerFault.exe 115 4376 2808 WerFault.exe 115 1160 3076 WerFault.exe 89 1716 2808 WerFault.exe 115 4560 2808 WerFault.exe 115 2508 2808 WerFault.exe 115 3548 2808 WerFault.exe 115 2904 2808 WerFault.exe 115 2888 2808 WerFault.exe 115 4756 2808 WerFault.exe 115 2720 2808 WerFault.exe 115 1916 2808 WerFault.exe 115 1820 2808 WerFault.exe 115 664 2808 WerFault.exe 115 2828 2808 WerFault.exe 115 3292 4376 WerFault.exe 172 4512 4376 WerFault.exe 172 1256 3120 WerFault.exe 180 5080 3120 WerFault.exe 180 4904 2808 WerFault.exe 115 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2444 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3076 b24cd81963b57556ae1bd102ca8ee22a.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3076 wrote to memory of 2808 3076 b24cd81963b57556ae1bd102ca8ee22a.exe 115 PID 3076 wrote to memory of 2808 3076 b24cd81963b57556ae1bd102ca8ee22a.exe 115 PID 3076 wrote to memory of 2808 3076 b24cd81963b57556ae1bd102ca8ee22a.exe 115 PID 2808 wrote to memory of 2444 2808 Utsysc.exe 134 PID 2808 wrote to memory of 2444 2808 Utsysc.exe 134 PID 2808 wrote to memory of 2444 2808 Utsysc.exe 134 PID 2808 wrote to memory of 1716 2808 Utsysc.exe 187 PID 2808 wrote to memory of 1716 2808 Utsysc.exe 187 PID 2808 wrote to memory of 1716 2808 Utsysc.exe 187 PID 1716 wrote to memory of 208 1716 rundll32.exe 188 PID 1716 wrote to memory of 208 1716 rundll32.exe 188 PID 2808 wrote to memory of 4376 2808 Utsysc.exe 189 PID 2808 wrote to memory of 4376 2808 Utsysc.exe 189 PID 2808 wrote to memory of 4376 2808 Utsysc.exe 189 PID 4376 wrote to memory of 2152 4376 rundll32.exe 190 PID 4376 wrote to memory of 2152 4376 rundll32.exe 190 PID 2808 wrote to memory of 2912 2808 Utsysc.exe 191 PID 2808 wrote to memory of 2912 2808 Utsysc.exe 191 PID 2808 wrote to memory of 2912 2808 Utsysc.exe 191 PID 2912 wrote to memory of 4564 2912 rundll32.exe 192 PID 2912 wrote to memory of 4564 2912 rundll32.exe 192
Processes
-
C:\Users\Admin\AppData\Local\Temp\b24cd81963b57556ae1bd102ca8ee22a.exe"C:\Users\Admin\AppData\Local\Temp\b24cd81963b57556ae1bd102ca8ee22a.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 5802⤵
- Program crash
PID:472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 6642⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 7442⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 8482⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 8562⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 8562⤵
- Program crash
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 11002⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 11122⤵
- Program crash
PID:2880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 12282⤵
- Program crash
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 6043⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 7963⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 8643⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 10163⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 10003⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 10163⤵
- Program crash
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 10443⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 9363⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 6883⤵
- Program crash
PID:1716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 6043⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 11283⤵
- Program crash
PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 6643⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 12003⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 12163⤵
- Program crash
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 12723⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 14403⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 14403⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 16483⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 16523⤵
- Program crash
PID:664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 10483⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 16643⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵PID:208
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵PID:2152
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵PID:4564
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 16522⤵
- Program crash
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 16602⤵
- Program crash
PID:1160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3076 -ip 30761⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3076 -ip 30761⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3076 -ip 30761⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3076 -ip 30761⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3076 -ip 30761⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3076 -ip 30761⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3076 -ip 30761⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3076 -ip 30761⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3076 -ip 30761⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3076 -ip 30761⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2808 -ip 28081⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2808 -ip 28081⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2808 -ip 28081⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2808 -ip 28081⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2808 -ip 28081⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2808 -ip 28081⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2808 -ip 28081⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2808 -ip 28081⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3076 -ip 30761⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2808 -ip 28081⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2808 -ip 28081⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2808 -ip 28081⤵PID:824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2808 -ip 28081⤵PID:4416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2808 -ip 28081⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2808 -ip 28081⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2808 -ip 28081⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2808 -ip 28081⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2808 -ip 28081⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2808 -ip 28081⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2808 -ip 28081⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2808 -ip 28081⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe1⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 4362⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 4562⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4376 -ip 43761⤵PID:648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4376 -ip 43761⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe1⤵
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 4322⤵
- Program crash
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 4402⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3120 -ip 31201⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3120 -ip 31201⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2808 -ip 28081⤵PID:4208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c2286ccc7d02d62441fc74e4e04e970b
SHA12802a9d2a6a07b3e91ada10be0a98e7c7dcdc7cc
SHA256fdf198ee0473bb4cdd8bd5c53c7f3807d6e354a5a563f61f29398037d25ff899
SHA512dad9cadfdebef8e550f47525c4c8507f88aa88a75595b15b3f04a2d4ceab141fa3f19fb124842bfff08076c6b2620a7bdeb0e62c5d57275cb9a575298e52a4d9
-
Filesize
482KB
MD5b24cd81963b57556ae1bd102ca8ee22a
SHA1e8c36efb9a650fe745dda09415d2a5d0813a7619
SHA256252850b3ba00d2467c4388bc99ce5c14abc78c21aba87062760bbb3d9aaf1df8
SHA51259198a8493f01a61d58eadfec5a96d97b96e0bb78e9a0776638fd02a53b7671e47d53254f2751801c548af65bfdceb7b6928da104ab3a53e35585ec36e5fb158
-
Filesize
272KB
MD5c99356f23dfde63c51e491938c56fcd9
SHA1b8ce3c5f1ef9dca570c155c63cf3ad23b5cfadc4
SHA256a680917ed607af20bc557d86d030eb0f7d18c79136c10b16a19a314e5016f3ae
SHA5127590338797f34837073d86304a39caddaa9ff1a2c17969605851b3fb48686bfb572aa166bf09af2dea53dfe44df1a344529c064026047eb19c0466016e705b24