Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:18
Behavioral task
behavioral1
Sample
7512aeaabc9121acae31ab38edb2ba61.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7512aeaabc9121acae31ab38edb2ba61.exe
Resource
win10v2004-20231215-en
General
-
Target
7512aeaabc9121acae31ab38edb2ba61.exe
-
Size
11KB
-
MD5
7512aeaabc9121acae31ab38edb2ba61
-
SHA1
f4a053c6de78f4aea3ecc3ec7e75e5946ffe932f
-
SHA256
e2aada4f8c14f09c18977e9bba42233d7cc7575502b379a4f95701658907c962
-
SHA512
770e0f4d6f4d4a60aa3b53d040e89c195da89c50c48d097bc6f46931d3a596214d21d7cd5e8038ceb245015f6208c5917c8a70053341102cb9a3fcdaa4ab0675
-
SSDEEP
192:nwh85gw7e+gUpY/fFaNJhLkwcud2DH9VwGfctAphgpNfFUJ/j:whA5e+gUp2aNJawcudoD7Uk6z9U1j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2900 b2e.exe -
Loads dropped DLL 5 IoCs
pid Process 2928 7512aeaabc9121acae31ab38edb2ba61.exe 2928 7512aeaabc9121acae31ab38edb2ba61.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe -
resource yara_rule behavioral1/memory/2928-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2928-10-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2192 2900 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2900 2928 7512aeaabc9121acae31ab38edb2ba61.exe 15 PID 2928 wrote to memory of 2900 2928 7512aeaabc9121acae31ab38edb2ba61.exe 15 PID 2928 wrote to memory of 2900 2928 7512aeaabc9121acae31ab38edb2ba61.exe 15 PID 2928 wrote to memory of 2900 2928 7512aeaabc9121acae31ab38edb2ba61.exe 15 PID 2900 wrote to memory of 2192 2900 b2e.exe 14 PID 2900 wrote to memory of 2192 2900 b2e.exe 14 PID 2900 wrote to memory of 2192 2900 b2e.exe 14 PID 2900 wrote to memory of 2192 2900 b2e.exe 14
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 1241⤵
- Loads dropped DLL
- Program crash
PID:2192
-
C:\Users\Admin\AppData\Local\Temp\1371.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\1371.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\1371.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\7512aeaabc9121acae31ab38edb2ba61.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900
-
C:\Users\Admin\AppData\Local\Temp\7512aeaabc9121acae31ab38edb2ba61.exe"C:\Users\Admin\AppData\Local\Temp\7512aeaabc9121acae31ab38edb2ba61.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD57cca02cab1740a2cde4f19401d90b761
SHA1211aedb45f6285b80b99ac2ab0997ab44c68beed
SHA256a3c2d58306e634011046cc19f0b26fefd3bb378c4c66d1f8d2df2937eeeeee33
SHA5126ba424faa5ca129382c0d179dbbb6d45ce28010d8936911b506a16afe1af433c289a5df361a83a50f1e0b470fbae037809416a45f097317a04227cfd49de5ff4