Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    3s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 20:31

General

  • Target

    49b0d888e217f8b200bf84c5d30d0526.exe

  • Size

    3.2MB

  • MD5

    49b0d888e217f8b200bf84c5d30d0526

  • SHA1

    d799c267d0e9e3ca69a5ef03c9f870bddd538b3c

  • SHA256

    b1125bd83f5c098f10321f008362a5737e2bcf0fffa1bdfa9b3b6e297f94432d

  • SHA512

    2e79c7851aa871b67e751582e00f1fcd2e54ee961fc91de99e1e88e5da7d007a16fa80924fe9240452fe7633a140f8ae6200729e6a49636341325c1526dc6d3c

  • SSDEEP

    98304:DvZQ+WdSExVcakchS87ccakc5J1at2QucakchS87ccakcO:Dq7dSgdlhS87cdl5JskTdlhS87cdlO

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 19 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe
    "C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe
      C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 616
        3⤵
        • Program crash
        PID:5044
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN 1WOV8tOcae1c > C:\Users\Admin\AppData\Local\Temp\lI62w.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3492
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe" /TN 1WOV8tOcae1c /F
        3⤵
        • Creates scheduled task(s)
        PID:2332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 648
        3⤵
        • Program crash
        PID:5000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 656
        3⤵
        • Program crash
        PID:1156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 736
        3⤵
        • Program crash
        PID:4968
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 652
        3⤵
        • Program crash
        PID:2612
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 708
        3⤵
        • Program crash
        PID:3824
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1456
        3⤵
        • Program crash
        PID:2848
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1904
        3⤵
        • Program crash
        PID:4548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2128
        3⤵
        • Program crash
        PID:3524
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1916
        3⤵
        • Program crash
        PID:1468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2088
        3⤵
        • Program crash
        PID:5112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2112
        3⤵
        • Program crash
        PID:4328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1952
        3⤵
        • Program crash
        PID:4704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1960
        3⤵
        • Program crash
        PID:3820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2096
        3⤵
        • Program crash
        PID:3608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1868
        3⤵
        • Program crash
        PID:4540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2160
        3⤵
        • Program crash
        PID:1100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2152
        3⤵
        • Program crash
        PID:912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 628
        3⤵
        • Program crash
        PID:3084
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /Query /XML /TN 1WOV8tOcae1c
    1⤵
      PID:3956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2032 -ip 2032
      1⤵
        PID:2420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2032 -ip 2032
        1⤵
          PID:3424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2032 -ip 2032
          1⤵
            PID:4860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2032 -ip 2032
            1⤵
              PID:1856
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2032 -ip 2032
              1⤵
                PID:4164
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2032 -ip 2032
                1⤵
                  PID:4688
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2032 -ip 2032
                  1⤵
                    PID:1512
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2032 -ip 2032
                    1⤵
                      PID:1984
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2032 -ip 2032
                      1⤵
                        PID:3500
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2032 -ip 2032
                        1⤵
                          PID:4872
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2032 -ip 2032
                          1⤵
                            PID:1592
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2032 -ip 2032
                            1⤵
                              PID:1700
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2032 -ip 2032
                              1⤵
                                PID:2760
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2032 -ip 2032
                                1⤵
                                  PID:4472
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2032 -ip 2032
                                  1⤵
                                    PID:3740
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2032 -ip 2032
                                    1⤵
                                      PID:720
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2032 -ip 2032
                                      1⤵
                                        PID:4488
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2032 -ip 2032
                                        1⤵
                                          PID:2964
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2032 -ip 2032
                                          1⤵
                                            PID:1408

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe

                                            Filesize

                                            43KB

                                            MD5

                                            367d9584d66e8a81c9c0b0bd8f181fbc

                                            SHA1

                                            cce105e676e7618ab7ba55d133242de4f9400aaa

                                            SHA256

                                            80174f7c14ff7dabbf5fe0dce1c11707977009740a6de4515e414f63ebf589ff

                                            SHA512

                                            77050b3d1d967200a060bfeac7661136c7483224c51ba11d19b1b50a0f50cdc54a39c90533dfe9c73bd98bebe37198dced15a57907005e5deb5f7103e493c23c

                                          • C:\Users\Admin\AppData\Local\Temp\lI62w.xml

                                            Filesize

                                            1KB

                                            MD5

                                            2d35763522be06e17cd1ad177655af7c

                                            SHA1

                                            208dd54ffc20f32f44582cb8e4bc5b058ba8fd54

                                            SHA256

                                            197f7528f979d86ffff64ad6d9e3191c7f13983a36363d0a613819333d72f441

                                            SHA512

                                            5c4c68067f4261b7b1d3c770791da7cdaa32127e5f901c10751265eaf495a40574f4398b9d63615fa70b7e88cc804c956e9454ee04290efa68a5c9f7460f6dc3

                                          • memory/1616-0-0x0000000000400000-0x000000000065C000-memory.dmp

                                            Filesize

                                            2.4MB

                                          • memory/1616-3-0x0000000001720000-0x000000000179E000-memory.dmp

                                            Filesize

                                            504KB

                                          • memory/1616-13-0x0000000000400000-0x000000000046B000-memory.dmp

                                            Filesize

                                            428KB

                                          • memory/1616-1-0x0000000000400000-0x000000000046B000-memory.dmp

                                            Filesize

                                            428KB

                                          • memory/2032-17-0x0000000001730000-0x00000000017AE000-memory.dmp

                                            Filesize

                                            504KB

                                          • memory/2032-23-0x00000000004B0000-0x000000000051B000-memory.dmp

                                            Filesize

                                            428KB

                                          • memory/2032-22-0x0000000000400000-0x000000000045B000-memory.dmp

                                            Filesize

                                            364KB

                                          • memory/2032-14-0x0000000000400000-0x000000000065C000-memory.dmp

                                            Filesize

                                            2.4MB

                                          • memory/2032-43-0x0000000000400000-0x000000000065C000-memory.dmp

                                            Filesize

                                            2.4MB