Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
5a9cdd82d1e927f26fe0052779c9c533.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a9cdd82d1e927f26fe0052779c9c533.exe
Resource
win10v2004-20231215-en
General
-
Target
5a9cdd82d1e927f26fe0052779c9c533.exe
-
Size
368KB
-
MD5
5a9cdd82d1e927f26fe0052779c9c533
-
SHA1
9eebf20c1a6e5f6a5f9efc9a724f41d67927b31f
-
SHA256
9eff10d5c6a4155245c97f614364b1f3e96a3ed065c1762a0b9a7802058128a1
-
SHA512
839a657fbeaef21ca5a3339fc2fbea92bf5c2b03c25459cae68427f04cc25f1dd0b001d50604ce5f354cffb6627fe6f132e2485f16ac07abcbf73f28b917269e
-
SSDEEP
6144:QSUllTpHeeh2jlBJsaRgGikFjXXtYt9+ZE2QYBVFsT5caPmNTmvAmAHkD:ILalBJj5jnetMnjj8maAmo0
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\State = "146944" c20dk0ulzOt8uFk2.exe -
resource yara_rule behavioral2/memory/8-2-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/8-6-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-8-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-7-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-9-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-14-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-15-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-19-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-20-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-21-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-24-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-25-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-26-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-29-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-30-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/732-33-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\c20dk0ulzOt8uFk2 c20dk0ulzOt8uFk2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 33 IoCs
pid pid_target Process procid_target 4904 732 WerFault.exe 51 4032 732 WerFault.exe 51 3816 732 WerFault.exe 51 4488 732 WerFault.exe 51 3608 732 WerFault.exe 51 1400 732 WerFault.exe 51 4984 732 WerFault.exe 51 904 732 WerFault.exe 51 4388 732 WerFault.exe 51 208 732 WerFault.exe 51 4536 732 WerFault.exe 51 4548 732 WerFault.exe 51 4660 732 WerFault.exe 51 2632 732 WerFault.exe 51 504 732 WerFault.exe 51 3668 732 WerFault.exe 51 656 732 WerFault.exe 51 1280 732 WerFault.exe 51 2160 732 WerFault.exe 51 3644 732 WerFault.exe 51 3596 732 WerFault.exe 51 2284 732 WerFault.exe 51 992 732 WerFault.exe 51 4464 732 WerFault.exe 51 4484 732 WerFault.exe 51 3392 732 WerFault.exe 51 5048 732 WerFault.exe 51 4604 732 WerFault.exe 51 4220 732 WerFault.exe 51 4228 732 WerFault.exe 51 4916 732 WerFault.exe 51 904 732 WerFault.exe 51 4924 732 WerFault.exe 51 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c20dk0ulzOt8uFk2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c20dk0ulzOt8uFk2.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use FormSuggest = "Yes" c20dk0ulzOt8uFk2.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main c20dk0ulzOt8uFk2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 8 5a9cdd82d1e927f26fe0052779c9c533.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 732 c20dk0ulzOt8uFk2.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 8 5a9cdd82d1e927f26fe0052779c9c533.exe 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe 732 c20dk0ulzOt8uFk2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 8 wrote to memory of 732 8 5a9cdd82d1e927f26fe0052779c9c533.exe 51 PID 8 wrote to memory of 732 8 5a9cdd82d1e927f26fe0052779c9c533.exe 51 PID 8 wrote to memory of 732 8 5a9cdd82d1e927f26fe0052779c9c533.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a9cdd82d1e927f26fe0052779c9c533.exe"C:\Users\Admin\AppData\Local\Temp\5a9cdd82d1e927f26fe0052779c9c533.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:8 -
C:\PROGRA~3\c20dk0ulzOt8uFk2.exeC:\PROGRA~3\c20dk0ulzOt8uFk2.exe2⤵
- Manipulates Digital Signatures
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 6483⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 10283⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 10803⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 11163⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 11203⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 11203⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 12523⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 12723⤵
- Program crash
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 12563⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 11883⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 11803⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 13483⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 13483⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 15683⤵
- Program crash
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 15803⤵
- Program crash
PID:504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 18763⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 19443⤵
- Program crash
PID:656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 19843⤵
- Program crash
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 15443⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 15963⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 19683⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 18803⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 18803⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 20163⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 20083⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 20403⤵
- Program crash
PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 20363⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 19723⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 16523⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 19483⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 19403⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 18763⤵
- Program crash
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 12483⤵
- Program crash
PID:4924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 732 -ip 7321⤵PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 732 -ip 7321⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 732 -ip 7321⤵PID:568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 732 -ip 7321⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 732 -ip 7321⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 732 -ip 7321⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 732 -ip 7321⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 732 -ip 7321⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 732 -ip 7321⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 732 -ip 7321⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 732 -ip 7321⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 732 -ip 7321⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 732 -ip 7321⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 732 -ip 7321⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 732 -ip 7321⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 732 -ip 7321⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 732 -ip 7321⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 732 -ip 7321⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 732 -ip 7321⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 732 -ip 7321⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 732 -ip 7321⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 732 -ip 7321⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 732 -ip 7321⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 732 -ip 7321⤵PID:996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 732 -ip 7321⤵PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 732 -ip 7321⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 732 -ip 7321⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 732 -ip 7321⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 732 -ip 7321⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 732 -ip 7321⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 732 -ip 7321⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 732 -ip 7321⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 732 -ip 7321⤵PID:1260