Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
b549fa455cc8b66ac27a271fe76c6cc9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b549fa455cc8b66ac27a271fe76c6cc9.exe
Resource
win10v2004-20240226-en
General
-
Target
b549fa455cc8b66ac27a271fe76c6cc9.exe
-
Size
396KB
-
MD5
b549fa455cc8b66ac27a271fe76c6cc9
-
SHA1
ea2bc94ac1ef48881686f79dcfc497da413de324
-
SHA256
3e5b1286667ea037f6baa0ebdbfe91fbe78262927b5149bbe2d2de201ed0533c
-
SHA512
4804649d8b06c7e4fb40129ffc1bd4868c03d0285b0a24ce86f818e8608fbd049909f56940ad0a44bd2bd68f1251dd8698b1fd9822ca8a469cb6ddb222c1fa2b
-
SSDEEP
6144:4YxZYe1tF9t3iY9tRQDnTB48KyNo4LYpXPjqijTHTM6Qb589up5+VVOsRiBmzo:PxZh1H9RfpMnTRKyUXbnIr/+2ks
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3836 mI01804IfDpO01804.exe -
Executes dropped EXE 1 IoCs
pid Process 3836 mI01804IfDpO01804.exe -
resource yara_rule behavioral2/memory/2620-1-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral2/memory/2620-13-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral2/memory/3836-14-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral2/memory/3836-22-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral2/memory/3836-29-0x0000000000400000-0x00000000004F0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mI01804IfDpO01804 = "C:\\ProgramData\\mI01804IfDpO01804\\mI01804IfDpO01804.exe" mI01804IfDpO01804.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2868 2620 WerFault.exe 86 1392 3836 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2620 b549fa455cc8b66ac27a271fe76c6cc9.exe 2620 b549fa455cc8b66ac27a271fe76c6cc9.exe 2620 b549fa455cc8b66ac27a271fe76c6cc9.exe 2620 b549fa455cc8b66ac27a271fe76c6cc9.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2620 b549fa455cc8b66ac27a271fe76c6cc9.exe Token: SeDebugPrivilege 3836 mI01804IfDpO01804.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3836 mI01804IfDpO01804.exe 3836 mI01804IfDpO01804.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2620 wrote to memory of 3836 2620 b549fa455cc8b66ac27a271fe76c6cc9.exe 93 PID 2620 wrote to memory of 3836 2620 b549fa455cc8b66ac27a271fe76c6cc9.exe 93 PID 2620 wrote to memory of 3836 2620 b549fa455cc8b66ac27a271fe76c6cc9.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b549fa455cc8b66ac27a271fe76c6cc9.exe"C:\Users\Admin\AppData\Local\Temp\b549fa455cc8b66ac27a271fe76c6cc9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 6682⤵
- Program crash
PID:2868
-
-
C:\ProgramData\mI01804IfDpO01804\mI01804IfDpO01804.exe"C:\ProgramData\mI01804IfDpO01804\mI01804IfDpO01804.exe" "C:\Users\Admin\AppData\Local\Temp\b549fa455cc8b66ac27a271fe76c6cc9.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 6683⤵
- Program crash
PID:1392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2620 -ip 26201⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3836 -ip 38361⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD550c5f13c0929db723d912ac0f344345e
SHA1a9693f6d2632353bce380268d51b87c6b4989694
SHA25670ad4e8bb26f80501343ffdcbea55f9688a831011119461c2895af1c74263178
SHA512bb9e28ccd964330bfb68259a576ffedb48d5e5568e3ca2438df9c08f38ad977bf8002a67105a380c60b103fd7c528c63ceb52e0be02105b8a201809cab331e32