Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
15b57d61e137e96d70cce644541adb9d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15b57d61e137e96d70cce644541adb9d.exe
Resource
win10v2004-20231215-en
General
-
Target
15b57d61e137e96d70cce644541adb9d.exe
-
Size
317KB
-
MD5
15b57d61e137e96d70cce644541adb9d
-
SHA1
943909ba5496f7a8b3faffca9d3ed061cec7311b
-
SHA256
7e99ebd5da7523d1d5a2511870560220cdc280acaab8a1e2c0f62344a86ab684
-
SHA512
96c2b492a25780007845fd6663b130aec270f4bda34ce3fb2cf7aa231712d1ff47e4e207ffc2cd627c4d41dab07ffe09e4954cc1d6a61b72ee2bf98ad5f9031d
-
SSDEEP
6144:WEFp3eC/4nXA13lwjbjHMGcnr6hDLCF1bzzFD5BrOSMInBOwUsD1N:WE4nX5Hrlcnr6hDLstzzYSMaBOwUsRN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 pGaLlFc01803.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 pGaLlFc01803.exe -
resource yara_rule behavioral2/memory/3428-2-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3428-4-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3428-5-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2676-18-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3428-21-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2676-22-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2676-33-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3428-40-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pGaLlFc01803 = "C:\\ProgramData\\pGaLlFc01803\\pGaLlFc01803.exe" pGaLlFc01803.exe -
Program crash 27 IoCs
pid pid_target Process procid_target 2840 3428 WerFault.exe 14 1368 3428 WerFault.exe 14 2312 2676 WerFault.exe 62 3736 3428 WerFault.exe 14 3556 2676 WerFault.exe 62 1392 3428 WerFault.exe 14 4692 2676 WerFault.exe 62 3592 3428 WerFault.exe 14 1152 2676 WerFault.exe 62 4400 2676 WerFault.exe 62 4568 3428 WerFault.exe 14 4036 3428 WerFault.exe 14 2504 2676 WerFault.exe 62 1316 2676 WerFault.exe 62 876 3428 WerFault.exe 14 4616 2676 WerFault.exe 62 920 2676 WerFault.exe 62 2156 2676 WerFault.exe 62 3876 2676 WerFault.exe 62 4080 2676 WerFault.exe 62 5088 2676 WerFault.exe 62 2840 2676 WerFault.exe 62 3704 2676 WerFault.exe 62 4400 3428 WerFault.exe 14 3576 3428 WerFault.exe 14 4036 2676 WerFault.exe 62 4384 2676 WerFault.exe 62 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3428 15b57d61e137e96d70cce644541adb9d.exe Token: SeDebugPrivilege 2676 pGaLlFc01803.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2676 pGaLlFc01803.exe 2676 pGaLlFc01803.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2676 pGaLlFc01803.exe 2676 pGaLlFc01803.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2676 pGaLlFc01803.exe 2676 pGaLlFc01803.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3428 wrote to memory of 2676 3428 15b57d61e137e96d70cce644541adb9d.exe 62 PID 3428 wrote to memory of 2676 3428 15b57d61e137e96d70cce644541adb9d.exe 62 PID 3428 wrote to memory of 2676 3428 15b57d61e137e96d70cce644541adb9d.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\15b57d61e137e96d70cce644541adb9d.exe"C:\Users\Admin\AppData\Local\Temp\15b57d61e137e96d70cce644541adb9d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 6162⤵
- Program crash
PID:2840
-
-
C:\ProgramData\pGaLlFc01803\pGaLlFc01803.exe"C:\ProgramData\pGaLlFc01803\pGaLlFc01803.exe" "C:\Users\Admin\AppData\Local\Temp\15b57d61e137e96d70cce644541adb9d.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 7603⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 7603⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 8123⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 8203⤵
- Program crash
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 9803⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 9963⤵
- Program crash
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 11043⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 9723⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 13923⤵
- Program crash
PID:920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 16043⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 15723⤵
- Program crash
PID:3876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 9243⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 16883⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 17803⤵
- Program crash
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 18003⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 9963⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 7643⤵
- Program crash
PID:4384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 7842⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 7842⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 7842⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 8162⤵
- Program crash
PID:3592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 9482⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 10202⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 10402⤵
- Program crash
PID:876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 6362⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 1522⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3428 -ip 34281⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3428 -ip 34281⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2676 -ip 26761⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3428 -ip 34281⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2676 -ip 26761⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3428 -ip 34281⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2676 -ip 26761⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3428 -ip 34281⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2676 -ip 26761⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3428 -ip 34281⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2676 -ip 26761⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3428 -ip 34281⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2676 -ip 26761⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2676 -ip 26761⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3428 -ip 34281⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2676 -ip 26761⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2676 -ip 26761⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2676 -ip 26761⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2676 -ip 26761⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 2676 -ip 26761⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 2676 -ip 26761⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2676 -ip 26761⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 2676 -ip 26761⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3428 -ip 34281⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3428 -ip 34281⤵PID:1192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 2676 -ip 26761⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 2676 -ip 26761⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD517690576009c09f21bfb33167594ae32
SHA120e1b01b73ccf9d354489e9c947dda0cefd48b76
SHA2561b2549475baef454506a3956e3161ae477c38c82a32c981e7836237561b47b88
SHA5129653c412e276e937709c2ce72c0b713ffc4ab7d62d70b3010ea329263c19945f9729f462afcefba2d2151610718c0a358b948bab5f7a9859c3eefeb12c6f04dd