Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 22:13

General

  • Target

    8d7c23f8accdd390dbc7c19c4cf80f06.exe

  • Size

    2.0MB

  • MD5

    8d7c23f8accdd390dbc7c19c4cf80f06

  • SHA1

    f93a224f46c1986e040f7bd7461a904bc38b608f

  • SHA256

    c094a1742298fa0cdea750a9f64892d250dfcd361ed1baffbcd5c752fcb26715

  • SHA512

    9894da06c276bfb85648829528b136c5ff71dec161050676465fce48fa2984d62941ba2390bf4a8b06127dd4c00c7f27beb91e31368bd99270624f46d26db695

  • SSDEEP

    49152:kOL8lm9XiydIgcakLz0ibq6yqhhubDY0CgOnQvEn0bcakLz0ibq6yqh:kOYlm9iydIgcakcibiqhMbMgOn7n0bcH

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Program crash 18 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe
    "C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe
      C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:5020
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe" /TN xWvB9PLxff3d /F
        3⤵
        • Creates scheduled task(s)
        PID:4340
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN xWvB9PLxff3d > C:\Users\Admin\AppData\Local\Temp\GX088.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN xWvB9PLxff3d
          4⤵
            PID:728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 616
          3⤵
          • Program crash
          PID:3824
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 656
          3⤵
          • Program crash
          PID:796
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 724
          3⤵
          • Program crash
          PID:3536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 744
          3⤵
          • Program crash
          PID:4052
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 760
          3⤵
          • Program crash
          PID:4544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 784
          3⤵
          • Program crash
          PID:5056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1464
          3⤵
          • Program crash
          PID:2928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1920
          3⤵
          • Program crash
          PID:916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 2144
          3⤵
          • Program crash
          PID:1388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1912
          3⤵
          • Program crash
          PID:5092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1924
          3⤵
          • Program crash
          PID:4648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1948
          3⤵
          • Program crash
          PID:3208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 2124
          3⤵
          • Program crash
          PID:3076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1964
          3⤵
          • Program crash
          PID:2488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1944
          3⤵
          • Program crash
          PID:2732
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1948
          3⤵
          • Program crash
          PID:3652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1960
          3⤵
          • Program crash
          PID:820
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 720
          3⤵
          • Program crash
          PID:2428
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5020 -ip 5020
      1⤵
        PID:4296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5020 -ip 5020
        1⤵
          PID:1372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5020 -ip 5020
          1⤵
            PID:4304
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5020 -ip 5020
            1⤵
              PID:4640
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5020 -ip 5020
              1⤵
                PID:4360
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5020 -ip 5020
                1⤵
                  PID:3044
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5020 -ip 5020
                  1⤵
                    PID:3732
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5020 -ip 5020
                    1⤵
                      PID:3668
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5020 -ip 5020
                      1⤵
                        PID:1276
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5020 -ip 5020
                        1⤵
                          PID:3784
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5020 -ip 5020
                          1⤵
                            PID:4756
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5020 -ip 5020
                            1⤵
                              PID:4164
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5020 -ip 5020
                              1⤵
                                PID:3480
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5020 -ip 5020
                                1⤵
                                  PID:2992
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5020 -ip 5020
                                  1⤵
                                    PID:3796
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5020 -ip 5020
                                    1⤵
                                      PID:4856
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5020 -ip 5020
                                      1⤵
                                        PID:1784
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5020 -ip 5020
                                        1⤵
                                          PID:2304

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe

                                          Filesize

                                          30KB

                                          MD5

                                          df6feeb0e0a0feebf324e7ffa324b560

                                          SHA1

                                          52c09f077b7eb2aace5fe7e79e3cda4b06f9418f

                                          SHA256

                                          5881571cdb0f1c5fa20fa0f6d76c2fc98f5e4c13cf5029023bf4df001764922a

                                          SHA512

                                          aff68117524f434e4506b6063051a9b6d96804f346d7c5032eb257b160f44e2a170276af6cf7c20cc6883c9087b350d290381ec50209d2fde7c01d4dce6acdfd

                                        • C:\Users\Admin\AppData\Local\Temp\GX088.xml

                                          Filesize

                                          1KB

                                          MD5

                                          eb34a136b8ae921a3e8c04280dbc7109

                                          SHA1

                                          45ba6be2f2b4767a46aa1bbfab28d338b5528f0c

                                          SHA256

                                          a7f6fafe9070df5ba2ab0064bf0278ed56d1044a80b2b7ec5ce761830a3ea506

                                          SHA512

                                          171375edbec7917461c3cd70542345f17c4bdd53d5003777f68c387fc804d4e725f20999bb63823496ee4221270ba96f02a42443bbc8ccaa8093ecbc6c6d169c

                                        • memory/3664-0-0x0000000000400000-0x000000000065C000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/3664-6-0x0000000001720000-0x000000000179E000-memory.dmp

                                          Filesize

                                          504KB

                                        • memory/3664-1-0x0000000000400000-0x000000000046B000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/3664-13-0x0000000000400000-0x000000000046B000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/5020-18-0x0000000025060000-0x00000000250DE000-memory.dmp

                                          Filesize

                                          504KB

                                        • memory/5020-23-0x0000000000400000-0x000000000045B000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/5020-22-0x0000000000470000-0x00000000004DB000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/5020-15-0x0000000000400000-0x000000000065C000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/5020-41-0x0000000000400000-0x000000000065C000-memory.dmp

                                          Filesize

                                          2.4MB