Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 19:46
Behavioral task
behavioral1
Sample
8d308d064922814330a8aaa355d9974d.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
8d308d064922814330a8aaa355d9974d.exe
-
Size
472KB
-
MD5
8d308d064922814330a8aaa355d9974d
-
SHA1
4eb03abe567e5d2ca12c5b124fd2f73888d3f3af
-
SHA256
4fe1a6248dc75e6d34dd12ec663629150f6205bd580c054f139fd0447d31f17e
-
SHA512
4189878da2cc893551cbc6920fd692b1f5a623db6c13c1932af4a6bd46af208a8618c49d76ddb68f568c47c4e059a8f0059f30c55ea23a671d0956ccbec07cee
-
SSDEEP
12288:9XrfSVYQy6JYGuglDIa5iPXdpDFhHcQWrBJu:9r7Q3YglDI1PNpHfm6
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 8d308d064922814330a8aaa355d9974d.exe -
resource yara_rule behavioral2/memory/1776-0-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral2/memory/1776-13-0x0000000000400000-0x00000000004C5000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1776 set thread context of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 3176 516 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 516 8d308d064922814330a8aaa355d9974d.exe 516 8d308d064922814330a8aaa355d9974d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90 PID 1776 wrote to memory of 516 1776 8d308d064922814330a8aaa355d9974d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d308d064922814330a8aaa355d9974d.exe"C:\Users\Admin\AppData\Local\Temp\8d308d064922814330a8aaa355d9974d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\8d308d064922814330a8aaa355d9974d.exeC:\Users\Admin\AppData\Local\Temp\8d308d064922814330a8aaa355d9974d.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 5163⤵
- Program crash
PID:3176
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 516 -ip 5161⤵PID:2924