Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 04:17

General

  • Target

    9639dbb1439d054a1d93f9267878e535.exe

  • Size

    2.0MB

  • MD5

    9639dbb1439d054a1d93f9267878e535

  • SHA1

    a84fc3c6dd807cf80e3c570e1d46903abcf9d797

  • SHA256

    20574ec9f2fd6d4a25904f42e95d10fd27cc2777f31bc3c489822a9ebbf0bdeb

  • SHA512

    a47ffbf742c3c106b0790f5c62378deaa5b06a46b849248583562f5121f5ddff10b5f36f9b97c7ca11c444a52018a0b09c8da2dc58f3d31244406a332af50604

  • SSDEEP

    49152:DV5vKx0T6vIpFCMGQ7ai7D3xTgOxYwpKq+DYstDZmgHFcGhYzRqGQ7ai7D3xTgOu:RhKx06I/JD2i7D3xkOxYwpKq+DYiZrYj

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9639dbb1439d054a1d93f9267878e535.exe
    "C:\Users\Admin\AppData\Local\Temp\9639dbb1439d054a1d93f9267878e535.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\9639dbb1439d054a1d93f9267878e535.exe
      C:\Users\Admin\AppData\Local\Temp\9639dbb1439d054a1d93f9267878e535.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9639dbb1439d054a1d93f9267878e535.exe" /TN EftJtVnu5bdb /F
        3⤵
        • Creates scheduled task(s)
        PID:1252
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN EftJtVnu5bdb > C:\Users\Admin\AppData\Local\Temp\R1ORgqfC7.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN EftJtVnu5bdb
          4⤵
            PID:4204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 608
          3⤵
          • Program crash
          PID:212
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 652
          3⤵
          • Program crash
          PID:3860
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4708 -ip 4708
      1⤵
        PID:5048
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4708 -ip 4708
        1⤵
          PID:3456

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\9639dbb1439d054a1d93f9267878e535.exe

          Filesize

          1.2MB

          MD5

          aeb35e40581f5d5f7f71ba124809959d

          SHA1

          b0a638e080432a178d31513cbc67a9114447740a

          SHA256

          5053922e4c4eacc2c9d18dc66037f50cf3a22e19050b1872b1be7eb950758726

          SHA512

          24866e90fa70b2d754e71836c915009688a990c2810aa692aa3059bc18ba433b34cdb3990232ac9e7ae2e2a1e6877a2a80b5bb19e98327405176db66e55ae06b

        • C:\Users\Admin\AppData\Local\Temp\R1ORgqfC7.xml

          Filesize

          1KB

          MD5

          ce422ce60ea252f01f2b366e895c1c2c

          SHA1

          29317936f7b3895c50b2a54008f846d2087a69be

          SHA256

          01de4b94fb8b3a4eee76724a81ed9521dc5d89600d47016c97f7111004b8afac

          SHA512

          5727c785651b030a82f7d45fe1ad07d09582020b261e217a0f2e9019b325395dae7532aa61d9d4ef22ae087b6f7bfd8effd183eec0732ace9cb28f2f225f86ba

        • memory/4260-0-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB

        • memory/4260-1-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/4260-3-0x0000000025020000-0x000000002509E000-memory.dmp

          Filesize

          504KB

        • memory/4260-13-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/4708-15-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB

        • memory/4708-18-0x0000000023FF0000-0x000000002406E000-memory.dmp

          Filesize

          504KB

        • memory/4708-22-0x00000000004B0000-0x000000000051B000-memory.dmp

          Filesize

          428KB

        • memory/4708-23-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/4708-40-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB