Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 05:55
Behavioral task
behavioral1
Sample
b3f4967d7a9a7c29f3844751de5ba7c7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3f4967d7a9a7c29f3844751de5ba7c7.exe
Resource
win10v2004-20240226-en
General
-
Target
b3f4967d7a9a7c29f3844751de5ba7c7.exe
-
Size
391KB
-
MD5
b3f4967d7a9a7c29f3844751de5ba7c7
-
SHA1
f84b22cc174149603352f13d512fe707b0a7fd92
-
SHA256
eb00619aee2f9e765d8e20bd99491ae6a8c0a3d6a9c04a242bae05a1ac442560
-
SHA512
0686025721c09a66b3c71c9ab69ecf83908edb39fa8bcf13caeacfcd46c006bcc64bb159092339f54977af342a0ec168a791b4d1247bec9f99bf6f5a375a7dd6
-
SSDEEP
12288:MjkArEN249AyE/rbaMct4bO2/VnKyNQs2sHy:/FE//Tct4bOstNZ2sHy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 server.exe -
Loads dropped DLL 6 IoCs
pid Process 2208 b3f4967d7a9a7c29f3844751de5ba7c7.exe 2208 b3f4967d7a9a7c29f3844751de5ba7c7.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe -
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2208-14-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2208-14-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2088 3036 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3036 2208 b3f4967d7a9a7c29f3844751de5ba7c7.exe 28 PID 2208 wrote to memory of 3036 2208 b3f4967d7a9a7c29f3844751de5ba7c7.exe 28 PID 2208 wrote to memory of 3036 2208 b3f4967d7a9a7c29f3844751de5ba7c7.exe 28 PID 2208 wrote to memory of 3036 2208 b3f4967d7a9a7c29f3844751de5ba7c7.exe 28 PID 3036 wrote to memory of 2088 3036 server.exe 29 PID 3036 wrote to memory of 2088 3036 server.exe 29 PID 3036 wrote to memory of 2088 3036 server.exe 29 PID 3036 wrote to memory of 2088 3036 server.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3f4967d7a9a7c29f3844751de5ba7c7.exe"C:\Users\Admin\AppData\Local\Temp\b3f4967d7a9a7c29f3844751de5ba7c7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 1203⤵
- Loads dropped DLL
- Program crash
PID:2088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD57f5198614e6f45199ee96f6747b4bbb5
SHA16d063375c52a990594a32c3fb1662219046b2189
SHA2566cf93998024b4b1f6a87d0e36c18476a7f0d8251b834fcd120811ab47c93befb
SHA5129688935d19a002e6f13294c854ff3405dadc0204c344f016e42a1c7a365c5a583c6e6a59d7ac6a654d3529ca2e16fcb36197cf55ac2728274b9e230d40522a30