Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 14:39

General

  • Target

    3a14ba03fcd9de0d13bc25886a404889.exe

  • Size

    36KB

  • MD5

    3a14ba03fcd9de0d13bc25886a404889

  • SHA1

    e7af049047040baf5894326bbf89699ec26c439e

  • SHA256

    88dad4e9505af471bf884f15967336c2194ae882d62abe87582cc37453e955a8

  • SHA512

    f32ceb0d2db669774ef1e1fee3b31b3cbba43dc8d05463ef8715856cf2acbc214bd7a86f60fdd1975984bc9e9dfdbf81d95b6f5c9a7e215b7ae062521cf7cf10

  • SSDEEP

    768:1IMOrAsxTthJ1ytul5UEHYwZJfUahdmy1AePz4G7fr93:1MPthJUtaHYwZ/fz4mf

Score
8/10

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 9 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
      PID:792
    • C:\Users\Admin\AppData\Local\Temp\3a14ba03fcd9de0d13bc25886a404889.exe
      "C:\Users\Admin\AppData\Local\Temp\3a14ba03fcd9de0d13bc25886a404889.exe"
      1⤵
      • Sets file execution options in registry
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" %1
        2⤵
          PID:824
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 576
          2⤵
          • Program crash
          PID:2208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 484
          2⤵
          • Program crash
          PID:3368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 556
          2⤵
          • Program crash
          PID:2452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2364 -ip 2364
        1⤵
          PID:2296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2364 -ip 2364
          1⤵
            PID:4436
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2364 -ip 2364
            1⤵
              PID:4896

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\rdl6A81.tmp

              Filesize

              6KB

              MD5

              4269bcbda7827f86dbe389b05dba8bda

              SHA1

              ecd560dc0da013cdee39778b5adcdb6cbe8685d2

              SHA256

              ad176598a6f1e3350878b9b2e5af4cb6d5ead9745d12cae5e94a50ea2b3e0321

              SHA512

              4197bb4a5da76f0a919a737e982512fc3e1b3d52bb19bcbf5e3bba5a31ac429a24370b6c9b33544a098ec7dfbb114b8c9ec783e39017b8e49410aaee141bf1e5

            • memory/2364-0-0x0000000000410000-0x0000000000429000-memory.dmp

              Filesize

              100KB

            • memory/2364-1-0x0000000000400000-0x0000000000410000-memory.dmp

              Filesize

              64KB

            • memory/2364-2-0x0000000000400000-0x0000000000410000-memory.dmp

              Filesize

              64KB

            • memory/2364-42-0x0000000000400000-0x0000000000410000-memory.dmp

              Filesize

              64KB

            • memory/2364-44-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB