Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
39b3895b60a...74.exe
windows7-x64
79b3895b60a...74.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/jah312913.exe
windows7-x64
3$TEMP/jah312913.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
9b3895b60aa7ea40160141ad7cb1d574.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b3895b60aa7ea40160141ad7cb1d574.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$TEMP/jah312913.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$TEMP/jah312913.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20231215-en
General
-
Target
9b3895b60aa7ea40160141ad7cb1d574.exe
-
Size
78KB
-
MD5
9b3895b60aa7ea40160141ad7cb1d574
-
SHA1
7d0ec762822cbcdcc514919348ec208ea10f8768
-
SHA256
cf2db4e305a4754cf4d9799d4681b0414b556f0fd83b5760e07c88fff637cb1f
-
SHA512
24cff8694a04940e994c320068338d489df9f526de9bbec9dcd0d61a408ecee91b841c92c5e2c21c38f8bc645c0d6c1e323b036591ebbbd0739eeb55b02efa4d
-
SSDEEP
1536:iZS8H/GZJ402wL7iHwMdnE4tmJ/SnKBjAlc0eV/9u68k6yNsbhC5aUFGVv9XGVv4:i8D40rL2DnVmJanK7/9u6pNuMVuVYg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2236 jah312913.exe -
Loads dropped DLL 8 IoCs
pid Process 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 2236 jah312913.exe 2236 jah312913.exe 2236 jah312913.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2148 2236 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2236 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 28 PID 1868 wrote to memory of 2236 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 28 PID 1868 wrote to memory of 2236 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 28 PID 1868 wrote to memory of 2236 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 28 PID 1868 wrote to memory of 2236 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 28 PID 1868 wrote to memory of 2236 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 28 PID 1868 wrote to memory of 2236 1868 9b3895b60aa7ea40160141ad7cb1d574.exe 28 PID 2236 wrote to memory of 2148 2236 jah312913.exe 29 PID 2236 wrote to memory of 2148 2236 jah312913.exe 29 PID 2236 wrote to memory of 2148 2236 jah312913.exe 29 PID 2236 wrote to memory of 2148 2236 jah312913.exe 29 PID 2236 wrote to memory of 2148 2236 jah312913.exe 29 PID 2236 wrote to memory of 2148 2236 jah312913.exe 29 PID 2236 wrote to memory of 2148 2236 jah312913.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b3895b60aa7ea40160141ad7cb1d574.exe"C:\Users\Admin\AppData\Local\Temp\9b3895b60aa7ea40160141ad7cb1d574.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\jah312913.exeC:\Users\Admin\AppData\Local\Temp\jah312913.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5f56df4dcfd49c789e0c83e160c1ce623
SHA1e9e2deaa69224c12c089826bd52a18592625b4df
SHA25625d7057b821465f5238226b3846b4b4e589e713265f7cf8dff40ba1c3560c0e1
SHA512f76e7e1f3feb3b98f25eb12885b44b92a7dde66c929721d13518486b9a4564f1fcaeeaadb7cb97f4911711c252dd43383a2fc248a3a52a1c3c62ddd00cc85036