Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 20:31
Behavioral task
behavioral1
Sample
49b0d888e217f8b200bf84c5d30d0526.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49b0d888e217f8b200bf84c5d30d0526.exe
Resource
win10v2004-20231215-en
General
-
Target
49b0d888e217f8b200bf84c5d30d0526.exe
-
Size
3.2MB
-
MD5
49b0d888e217f8b200bf84c5d30d0526
-
SHA1
d799c267d0e9e3ca69a5ef03c9f870bddd538b3c
-
SHA256
b1125bd83f5c098f10321f008362a5737e2bcf0fffa1bdfa9b3b6e297f94432d
-
SHA512
2e79c7851aa871b67e751582e00f1fcd2e54ee961fc91de99e1e88e5da7d007a16fa80924fe9240452fe7633a140f8ae6200729e6a49636341325c1526dc6d3c
-
SSDEEP
98304:DvZQ+WdSExVcakchS87ccakc5J1at2QucakchS87ccakcO:Dq7dSgdlhS87cdl5JskTdlhS87cdlO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2032 49b0d888e217f8b200bf84c5d30d0526.exe -
Executes dropped EXE 1 IoCs
pid Process 2032 49b0d888e217f8b200bf84c5d30d0526.exe -
resource yara_rule behavioral2/memory/1616-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/memory/2032-14-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x00070000000231fe-12.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 19 IoCs
pid pid_target Process procid_target 5044 2032 WerFault.exe 17 5000 2032 WerFault.exe 17 1156 2032 WerFault.exe 17 4968 2032 WerFault.exe 17 2612 2032 WerFault.exe 17 3824 2032 WerFault.exe 17 2848 2032 WerFault.exe 17 4548 2032 WerFault.exe 17 3524 2032 WerFault.exe 17 1468 2032 WerFault.exe 17 5112 2032 WerFault.exe 17 4328 2032 WerFault.exe 17 4704 2032 WerFault.exe 17 3820 2032 WerFault.exe 17 3608 2032 WerFault.exe 17 4540 2032 WerFault.exe 17 1100 2032 WerFault.exe 17 912 2032 WerFault.exe 17 3084 2032 WerFault.exe 17 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2332 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1616 49b0d888e217f8b200bf84c5d30d0526.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1616 49b0d888e217f8b200bf84c5d30d0526.exe 2032 49b0d888e217f8b200bf84c5d30d0526.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2032 1616 49b0d888e217f8b200bf84c5d30d0526.exe 17 PID 1616 wrote to memory of 2032 1616 49b0d888e217f8b200bf84c5d30d0526.exe 17 PID 1616 wrote to memory of 2032 1616 49b0d888e217f8b200bf84c5d30d0526.exe 17 PID 2032 wrote to memory of 2332 2032 49b0d888e217f8b200bf84c5d30d0526.exe 27 PID 2032 wrote to memory of 2332 2032 49b0d888e217f8b200bf84c5d30d0526.exe 27 PID 2032 wrote to memory of 2332 2032 49b0d888e217f8b200bf84c5d30d0526.exe 27 PID 2032 wrote to memory of 3492 2032 49b0d888e217f8b200bf84c5d30d0526.exe 26 PID 2032 wrote to memory of 3492 2032 49b0d888e217f8b200bf84c5d30d0526.exe 26 PID 2032 wrote to memory of 3492 2032 49b0d888e217f8b200bf84c5d30d0526.exe 26 PID 3492 wrote to memory of 3956 3492 cmd.exe 20 PID 3492 wrote to memory of 3956 3492 cmd.exe 20 PID 3492 wrote to memory of 3956 3492 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe"C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exeC:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6163⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 1WOV8tOcae1c > C:\Users\Admin\AppData\Local\Temp\lI62w.xml3⤵
- Suspicious use of WriteProcessMemory
PID:3492
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe" /TN 1WOV8tOcae1c /F3⤵
- Creates scheduled task(s)
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6483⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6563⤵
- Program crash
PID:1156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 7363⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6523⤵
- Program crash
PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 7083⤵
- Program crash
PID:3824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 14563⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 19043⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 21283⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 19163⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 20883⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 21123⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 19523⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 19603⤵
- Program crash
PID:3820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 20963⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 18683⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 21603⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 21523⤵
- Program crash
PID:912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6283⤵
- Program crash
PID:3084
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 1WOV8tOcae1c1⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2032 -ip 20321⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2032 -ip 20321⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2032 -ip 20321⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2032 -ip 20321⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2032 -ip 20321⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2032 -ip 20321⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2032 -ip 20321⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2032 -ip 20321⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2032 -ip 20321⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2032 -ip 20321⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2032 -ip 20321⤵PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2032 -ip 20321⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2032 -ip 20321⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2032 -ip 20321⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2032 -ip 20321⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2032 -ip 20321⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2032 -ip 20321⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2032 -ip 20321⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2032 -ip 20321⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5367d9584d66e8a81c9c0b0bd8f181fbc
SHA1cce105e676e7618ab7ba55d133242de4f9400aaa
SHA25680174f7c14ff7dabbf5fe0dce1c11707977009740a6de4515e414f63ebf589ff
SHA51277050b3d1d967200a060bfeac7661136c7483224c51ba11d19b1b50a0f50cdc54a39c90533dfe9c73bd98bebe37198dced15a57907005e5deb5f7103e493c23c
-
Filesize
1KB
MD52d35763522be06e17cd1ad177655af7c
SHA1208dd54ffc20f32f44582cb8e4bc5b058ba8fd54
SHA256197f7528f979d86ffff64ad6d9e3191c7f13983a36363d0a613819333d72f441
SHA5125c4c68067f4261b7b1d3c770791da7cdaa32127e5f901c10751265eaf495a40574f4398b9d63615fa70b7e88cc804c956e9454ee04290efa68a5c9f7460f6dc3