Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 14:00

General

  • Target

    b4df09479980cf5eb0ee2f13ca8a2215.exe

  • Size

    3.2MB

  • MD5

    b4df09479980cf5eb0ee2f13ca8a2215

  • SHA1

    841491b4de724b7ec91cdcebac90f5cbb33cdcac

  • SHA256

    3594a2dc1ce4aeefa02dc077e297ce1b0f715aacddd03ff6d4f726f76f12eb96

  • SHA512

    298be6473d7499f13152ce5976a685b7bb155f682ed4463eb5897fbe3b1904c62d9d9937c8e1ae6ae3bea1078c026de518e13fa6f2e64f8d1a2a403804e786d7

  • SSDEEP

    98304:UaxKw1cakchS87ccakc5J1at2QucakchS87ccakcO:UgdlhS87cdl5JskTdlhS87cdlO

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4df09479980cf5eb0ee2f13ca8a2215.exe
    "C:\Users\Admin\AppData\Local\Temp\b4df09479980cf5eb0ee2f13ca8a2215.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\b4df09479980cf5eb0ee2f13ca8a2215.exe
      C:\Users\Admin\AppData\Local\Temp\b4df09479980cf5eb0ee2f13ca8a2215.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b4df09479980cf5eb0ee2f13ca8a2215.exe" /TN obYzNKzF95b4 /F
        3⤵
        • Creates scheduled task(s)
        PID:3916
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN obYzNKzF95b4 > C:\Users\Admin\AppData\Local\Temp\0MU9L.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN obYzNKzF95b4
          4⤵
            PID:4592
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 616
          3⤵
          • Program crash
          PID:856
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 616
          3⤵
          • Program crash
          PID:2452
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2292 -ip 2292
      1⤵
        PID:4732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2292 -ip 2292
        1⤵
          PID:1792

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\0MU9L.xml

          Filesize

          1KB

          MD5

          5e2da025885120802dbe381207d4b10c

          SHA1

          7b4b33be28b786c0f82c4046694fb8ea92976fb2

          SHA256

          723e6e03d8ec7882e95073ab427d0e57ec03b70a13ce85a61d4fceecd03df0f3

          SHA512

          73c097a9559c6a4c9138c93d0059bf56304bdbf63148c6173627cb099b05e91541de96aa658ce36f6f274917e97ab72748eec6061d07f20cbf12b06427c9fe09

        • C:\Users\Admin\AppData\Local\Temp\b4df09479980cf5eb0ee2f13ca8a2215.exe

          Filesize

          3.2MB

          MD5

          cbacf854b59f40a77ba0d7f3a7b1b5f0

          SHA1

          4104202e73c76032366bf7fafe0fae93692d71e5

          SHA256

          43a845bcdebdcdbc4e8d44560a2659a8c296fc3763cefa81eea0c3d100c4d615

          SHA512

          80ae82b2fe611fb561a160d68bd2139e30a8f28fc3842b3e6cd42f622a688911138c771822196fc4a2c3cfe7838ea6051d1bd960af85df7fa1b4e8cbf5bc1f71

        • memory/316-0-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB

        • memory/316-1-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/316-3-0x0000000024FF0000-0x000000002506E000-memory.dmp

          Filesize

          504KB

        • memory/316-13-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2292-15-0x0000000023FD0000-0x000000002404E000-memory.dmp

          Filesize

          504KB

        • memory/2292-18-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB

        • memory/2292-22-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2292-24-0x00000000004B0000-0x000000000051B000-memory.dmp

          Filesize

          428KB

        • memory/2292-40-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB