Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
209s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
reWASD700-8447.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
reWASD700-8447.exe
Resource
win10v2004-20231215-en
General
-
Target
reWASD700-8447.exe
-
Size
50.6MB
-
MD5
1fe2497c00c2f0cf8e83d66ffc6cfa98
-
SHA1
290cbe2892da61e6ded1233b3b233f4d5a8ef952
-
SHA256
bc9c416ce788138b88ab4775947237151455d5ad0ba063809f8c8f825dda6db9
-
SHA512
77c3ec18f02e7d87ad3dda68b7135ee8dfe0031754297d72d3c694f2a2b547a85ec25f4a9cf53de33544a2941970ccee55d99ef4820dc045dc6730249e2b8ede
-
SSDEEP
1572864:lLxiua7+EGu5gxFs+yGKmaIDIv5EN2wKZE:lq7iMgxFry/C5ZqE
Malware Config
Signatures
-
Loads dropped DLL 30 IoCs
pid Process 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe 1964 reWASD700-8447.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1164 1964 WerFault.exe 88 4852 1964 WerFault.exe 88 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1964 reWASD700-8447.exe Token: SeDebugPrivilege 4092 taskmgr.exe Token: SeSystemProfilePrivilege 4092 taskmgr.exe Token: SeCreateGlobalPrivilege 4092 taskmgr.exe Token: 33 4092 taskmgr.exe Token: SeIncBasePriorityPrivilege 4092 taskmgr.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\reWASD700-8447.exe"C:\Users\Admin\AppData\Local\Temp\reWASD700-8447.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 18002⤵
- Program crash
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 18002⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1964 -ip 19641⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1964 -ip 19641⤵PID:1972
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD56f6521728c50805453eaa416f8519292
SHA159f7cf61a3a8ff51edeceade7b95c261f4f3bde5
SHA25613f71b231e35b4fd911642b31047e4016cb099318a4a15368124d0bc5ab11151
SHA512c1e74c0bfa58291fb71c823faa9df1085db03c8de65db12d40cc4e592792082bca148686e7890d28700ada2f321926bf9469de20098ce4aebb1ca354affc79c2
-
Filesize
43KB
MD5973a8bec8e95f24c19e09cbdf764a16d
SHA1e6fd230b34662df0791ecc3e6b7fda1fd8719d06
SHA2569910114119cf67e83db3c58a38e566db6e4923f71f3eb2060970012847666d9c
SHA5122292755471073ad879a3262971c3af24d08c1bb1077e74541250b9805e0bb8cdbc1184f3f1c51a6ea1e112af135e08e964ef968d03647eae1788683c06c68ea1
-
Filesize
155KB
MD5ad71a5e3a757aef0329aeda567f25a00
SHA197c766d85c9dabfcabd5a983fe165506d227a8ac
SHA256f6b9ae6eaaedc55db0e381ec153892c122f1f257ada80cf242a20be8a2f117ef
SHA5126852496fb8f59bea3ae46efd507d654ae27306d9f4f2f0dc0db8b03f9f63a3712e075b12f0ebdf6ea88db081fca4dd29be1555584aa70386ccb8297beef886ea
-
Filesize
83KB
MD5bf591f4d366c6c27862373dfe1ed9c8a
SHA1907037948f7708bbfda0d91725801ee80dfdafb0
SHA256cdb1fcb52d718427246a79e810e59914386bddef399a7713405681fcb33ddb31
SHA512f336edc46c231d5cd3ea9959fec3db42886e5fa7b066564ee0b996a4e7be62e832149ca9b59086e8f00219defbe150a94e0d32f018fb10cd4e2b2dbddce42177
-
Filesize
84KB
MD5178f9e57ca31a09c18a5983c9ddbc3a2
SHA10ed1366fdf7ad9a01cbf5eeb9239c7f805d77e73
SHA25671e77957c236171222f7a5ddc1ae3381141ad617a17798737a0c0e5b5bb38d58
SHA5124cb9623e60807789ea0f1fef773d8fa02e268aeefe90a14d4e8fe1e44be7f1742fb54226e68eff921783c6f4f09ab850ed0ebe202eac80b97d85aec63d188b7f
-
Filesize
206KB
MD54cbd547904dbb9e6cca6931cf58c8c1e
SHA1d166fb044063f34ffcca83a2f3b40fd29626b3f9
SHA25624a8b7347a7ad2118bd7368e1f1fdec0148f5128f1c3741ff80b56b1c0ff3fe7
SHA512e03e4454cfaf38a20a7c4e58a4fa951f49c1bba7871f565c9be57daca5032ea1aee6e2fe4679f8ace2f1b167bca0e625af774e49747dc860ac15630e712d4599
-
Filesize
171KB
MD579654940dd2606fb404152697446ffa9
SHA1f9091154bfca73b2ff9bf5905f943924797b24d4
SHA2567a71e4067f7dba33f040a7d9697e57f5d40806a6bacc7256aff1175261f5181c
SHA512ff81db1a5a7b017b21f73e23f75a3dd860a0dc637d10f7cf23fb6ee02d35594517a0e01b0393104e0ef65f69f3e736c0d0d4529646d2441d60263dd1ce589def
-
Filesize
199KB
MD5ba9dadbf5d2408b15c673c0db76dedb3
SHA1acd61dc7aedc9131fda2046a1cecf455500f1ff4
SHA256d4767ae746392c47750ff3270dae18563d38e0fbedf7d6ef0c875d094da91552
SHA5120ff54173657df32080f50b08144d9eec42e31ac5e83020b3a760ab90773ddecb19a184c13b9ec9828bb2879070dd17cc9ba1f61358bcdda9bfa0ad8757b550ba
-
Filesize
211KB
MD58853e74cd4c71f978465c7c3e25b5e2e
SHA14a00dba78fdda7bf5d8becb3de9622407eb371fe
SHA2561b1ca005d084b495243c966416ec8f789e9f6f2b05dedc6272bd0b3de5aecafe
SHA5122eb757ae7373d4e7c9d2b727cf122d1214f1ec41e87863023d1e067eb00b501fb6f4af324fc91273885e8c5a915dfb4348b3855668807f4b7242b824645bcb60
-
Filesize
200KB
MD5c063a9da8b077d1b702d44ea9b1a0bd4
SHA190654ad00a9f858e5fb6cab41b90395ec4880d5a
SHA256afb2cf086a9f99b1457c7172f1d6c8ce83e84d83c622b9297679834804fdf780
SHA5120ee90475bb435260dc158f55da0508e2da78515862e96d5455f5fea92c71770a51c4ac7a4525702f7aa53a32a0374989dd4c76c90e65f86a7a414a1e38dc4b84
-
Filesize
108KB
MD53b0cf857ab3627ad188a230b5110b0c3
SHA14a306aa3bb6e1186368cb22bebf678d979f4a016
SHA2564e944e0397c5bc17ef8ffba37b8f7af490929de33a1cb47534b4d8e6fc1e7d13
SHA5129ad0f988efbf1b7c6191c8feabcc000bd9c6b4548eafc0e618ec3c5751df220640a1c2d27bb812e274da1b9638bf0b12245e8de9e6cfb33f4e87b65b5d7ec170
-
Filesize
7KB
MD5c1d29c8166c18bfde7dc4b79d7f5960a
SHA1b380a3f463d52ab31350b267ea51376461c4d66d
SHA256a343e53039c54ccf24f96408dfeea825b3008219afef803dfe1968a79fae4bcc
SHA5126ed2327578ff654bc78d7d2f67e63cbd085921b818560f68baee8d8c09665dc7ce02232e0b0e0fb13c85b9f1a516cb47cc285d7812f698f9341cf5226d4ca345
-
Filesize
199KB
MD546d6dc8b3826219e8f171fa1c281cf7c
SHA1d787a25f6dbb99020ed2d5528868081700cb7f91
SHA256cd6e42db77254268e4bcc3dbf042e3199f94969ef6d39224fa4e8b2a2d74c75b
SHA5124a4871d7f450dce6058f129c9e657db796b69619e7894fa658a0e3e232497aa58cc4a277e9e055e1dcbf65112aafab3464899248f1c202d6bc3343e873614d3b
-
Filesize
195KB
MD589e8cdc2eb2c1812d30255a6ae7c24a6
SHA1af723c6c7ac58f9bb1c1c9013f0e0c288c60087e
SHA256c5e221eda4de0828afca1fd685554ccf1493ec1d53daa143592e68a63cc4271f
SHA512f53b8c1830482c26d7618332e7259771b17cfe01403a3a3cdbbce40aaf7e8f63b561cbc63b420a0f04c0a3c72f78276bb47c1a8f395099c951a33e263a37195f
-
Filesize
188KB
MD55712264e6f283eae9ec5c992ccf41f57
SHA150795d52d10b880cbd579043987af34990cbc99a
SHA2562dec23e2b4d1b74f3779005bb8192af6d4722ee9915d8ea67c3a04f3f9d414c2
SHA512fa68fa14aff8ea380f1b4158a5849381a94f2166a8afbed4f129dfcf6c2b60d692d746f49a5bd124df807eb22da4025a8428017ca8fda84c3acaf0d479271c6b
-
Filesize
60KB
MD52661c176ef967fb3948007e2026f24ec
SHA1bd0ac37647fe122e9892117ffd34043fef96fb25
SHA25630710cebf5959208a6a79dc22f5d483fcee4dce27a86b5827ccf562af630441d
SHA512c2e423e4285f9a9a22df0c2d0512a2ea82713ee95a42cabd71482d9194e5225d086ac02a58087736964713fe4129684cdbd0a5895e5cae2999aaa119441af07b
-
Filesize
46KB
MD528cbeb7eb3a65159557126e5f3377215
SHA1c7d0f3997c59b8790d3b57d1c6a987b0facb148e
SHA256b4467088f07ebb9b1f32a0174b382a4a73215d990e05e901b20237c18d517ce4
SHA512a5423a12d45d492bfa779477480a70fb31f7e0e0d9aa35ef68e8fba92f23d6e8851ff6b752f61eba2bc215ecc4d209d37e1ab73204afb4a86b14ea340bfeafd1
-
Filesize
54KB
MD5d6b20c4554288333545dc5e047a0fd8f
SHA14f77abcb69af6bc0eaa320b19d7b8b0cdb380fea
SHA25649c59ddc70a4bf0d9c73e08e4c2154cf1365eae8979efac205d608a770b68d1d
SHA5124d9581912065063bcfcf5f402881b5cc01946d2d20edfa2ba0541efaedb39ec4cadd793479b00f76bc572422fd0c65af60a2bd8c88112b28abfdcf0cc4502426
-
Filesize
19KB
MD5526dafac45973f81bbd7b6b8278c2a5f
SHA1e4076bdaca9563a745fa6c6a79af9d28d0127a92
SHA256a156267a32f1844d24b09af2dd957dc75652b15286a8ec5107eed86f79282d91
SHA512d4995f784efb50831c702aec68f5b42692985bee46bfb238c65b173116cca7b371b61f0304adb82b63b393acf2f94e4022e4efea13b10c74ee50f13b0af29b22
-
Filesize
761KB
MD50b36a9bd0838bde3ed7ce102b91ba083
SHA1dee9eaca21a63448466aa344a44710e941762cdd
SHA256ba62f6e8e9d3e2bd2c982e755e165fb2977b6ef989c69a613f5e2e9207f39a71
SHA5125024c3a6d928196192eb7a656a680d235ba0b968287da358b970cdfa3390607396aa885537af510506dc5cd36b2fa311c4f7a42cec5b9595adc98cd8f11afdc5