Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
3f0fb4fa09d64d152e2c345152f668ed.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f0fb4fa09d64d152e2c345152f668ed.exe
Resource
win10v2004-20231215-en
General
-
Target
3f0fb4fa09d64d152e2c345152f668ed.exe
-
Size
759KB
-
MD5
3f0fb4fa09d64d152e2c345152f668ed
-
SHA1
b54396c192ef69372fd1d6f9bf1a4b3dbf3d9a41
-
SHA256
24aad9c501f96eee3604ab467e710703168125d0b69ba618e63bd4f2ec46c552
-
SHA512
d21fa9402b1cd332c0a91de64a9f92dd09523128ff7a7fdeae728bc77a6ed0e46250445934d66f5d2b4fc1337139d1d8d7d0c69a7e97f830b1214d59c3960364
-
SSDEEP
12288:Np4xDfr5AsTKV4gZMjHkU+aNiRqtvQ9N0gYzj9+TAYrUaGRrBNvEuAgVaRdLuVsP:NpIDPTY48Mr5wqt48gYxmUas1NvEuAgE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3368 setup.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 680 3368 WerFault.exe 90 4796 3368 WerFault.exe 90 3280 3368 WerFault.exe 90 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4084 3f0fb4fa09d64d152e2c345152f668ed.exe 4084 3f0fb4fa09d64d152e2c345152f668ed.exe 3368 setup.exe 3368 setup.exe 3368 setup.exe 3368 setup.exe 3368 setup.exe 3368 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 3368 4084 3f0fb4fa09d64d152e2c345152f668ed.exe 90 PID 4084 wrote to memory of 3368 4084 3f0fb4fa09d64d152e2c345152f668ed.exe 90 PID 4084 wrote to memory of 3368 4084 3f0fb4fa09d64d152e2c345152f668ed.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f0fb4fa09d64d152e2c345152f668ed.exe"C:\Users\Admin\AppData\Local\Temp\3f0fb4fa09d64d152e2c345152f668ed.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 7843⤵
- Program crash
PID:680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 15363⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 15323⤵
- Program crash
PID:3280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3368 -ip 33681⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3368 -ip 33681⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3368 -ip 33681⤵PID:4968
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD53051f2165a8723cc156037acf0fed1f0
SHA122e2beac922644f8f4f3fa0db584b0f21809a3fc
SHA256d7e95120729ebcc4892da87e17a533ec6ea97dbdadd84c523597685f95720133
SHA51263db4d24947dfb7a437bf0ec2e71589c4fc14c9c3dbaef2f604631a7b11d49f64620dbbedd6a4356697a5a3b734b7ce5cf41ab1dc7f84392e1bd538a88b11bd5
-
Filesize
64KB
MD59e1eb1094ed4e46602a98e9bcb77fb8b
SHA1f80771f6ec20aafc295dc52dbecb28a70755b9d8
SHA25644c39935ef645aa67a4f5f3ccb42edf38f4af8c5d6054c46c2d925ed068b69d0
SHA512809c3f95f049585b7d6734bc9d75894afd8449ff816552aa0e5ccb3db20f0b046fe0a9e5f9c73f2a70dc2b48bdfe5ee63319be59801b99c56a2bb5fd17f0e8b7