Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
2b0e50ef2ef7c139995e5b15b2e99958.exe
Resource
win7-20231129-en
General
-
Target
2b0e50ef2ef7c139995e5b15b2e99958.exe
-
Size
880KB
-
MD5
2b0e50ef2ef7c139995e5b15b2e99958
-
SHA1
c04153b4131f406db60c277621d7d7c60b239ebb
-
SHA256
570031329fa9389362823bb563f1503431931921cee787ac61e07acfa3285b26
-
SHA512
d368af81a9e50b97c78f2a086d56a21e04e97672f0c379dc516c8d0e36ca034886264d710d861be1103ab868290eb2162a8f50583bacffe5864cea7fe5e21066
-
SSDEEP
24576:eYUp8WDlv+glws82dl+iTCfK2qoNy1kKYUaM:erp8Whv/istdlfTCyPoNynOM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5040 imoninstall.exe -
Loads dropped DLL 50 IoCs
pid Process 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 5040 imoninstall.exe 5040 imoninstall.exe 5040 imoninstall.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3732 3532 WerFault.exe 16 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3532 wrote to memory of 5040 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 49 PID 3532 wrote to memory of 5040 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 49 PID 3532 wrote to memory of 5040 3532 2b0e50ef2ef7c139995e5b15b2e99958.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b0e50ef2ef7c139995e5b15b2e99958.exe"C:\Users\Admin\AppData\Local\Temp\2b0e50ef2ef7c139995e5b15b2e99958.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 16082⤵
- Program crash
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\nsi4E21.tmp\imoninstall.exeC:\Users\Admin\AppData\Local\Temp\nsi4E21.tmp\imoninstall.exe ~URL Parts Error~~~~URL Parts Error~URL Parts Error~~#~5908~5171~~URL Parts Error~~SendRequest Error~6E-DC-CF-83-38-86~#~~SendRequest Error~~~~2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3532 -ip 35321⤵PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5b140459077c7c39be4bef249c2f84535
SHA1c56498241c2ddafb01961596da16d08d1b11cd35
SHA2560598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67
SHA512fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328