Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 00:37 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d779c777a29f9250ff00ecbdc765c4c4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d779c777a29f9250ff00ecbdc765c4c4.exe
Resource
win10v2004-20240319-en
General
-
Target
d779c777a29f9250ff00ecbdc765c4c4.exe
-
Size
380KB
-
MD5
d779c777a29f9250ff00ecbdc765c4c4
-
SHA1
8dfec79231cc8dcd8d310aac935eb00f396a2a35
-
SHA256
ecd638f701bf62044f91a3179b4f1381c1195e053e976cdc29b4a89d625f30dd
-
SHA512
b89889227782aec04df8080f2afb7aac3ab6badd1eb8c572df1f12503cc17f6cf931da403e878ac5b8f85daf54ed958952d614fdfe4f1162d51c51540da7fea4
-
SSDEEP
6144:sAoHZ+azbYMVsx/PaRs+4FEUqs6PbcFMRJ8lMuSM+gnktWx9Xxao/Lf:lotoMSPakAPbcgJpMdnwgXxawL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation d779c777a29f9250ff00ecbdc765c4c4.exe -
Executes dropped EXE 1 IoCs
pid Process 3392 icbasmyfv.exe -
Loads dropped DLL 1 IoCs
pid Process 3392 icbasmyfv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
pid pid_target Process procid_target 1068 2808 WerFault.exe 89 4892 2808 WerFault.exe 89 4192 2808 WerFault.exe 89 3564 2808 WerFault.exe 89 3008 2808 WerFault.exe 89 4884 2808 WerFault.exe 89 4284 2808 WerFault.exe 89 2492 2808 WerFault.exe 89 4756 2808 WerFault.exe 89 4176 3392 WerFault.exe 118 1032 3392 WerFault.exe 118 2612 3392 WerFault.exe 118 3608 3392 WerFault.exe 118 -
Kills process with taskkill 1 IoCs
pid Process 704 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4552 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 704 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4440 2808 d779c777a29f9250ff00ecbdc765c4c4.exe 111 PID 2808 wrote to memory of 4440 2808 d779c777a29f9250ff00ecbdc765c4c4.exe 111 PID 2808 wrote to memory of 4440 2808 d779c777a29f9250ff00ecbdc765c4c4.exe 111 PID 4440 wrote to memory of 704 4440 cmd.exe 115 PID 4440 wrote to memory of 704 4440 cmd.exe 115 PID 4440 wrote to memory of 704 4440 cmd.exe 115 PID 4440 wrote to memory of 4552 4440 cmd.exe 117 PID 4440 wrote to memory of 4552 4440 cmd.exe 117 PID 4440 wrote to memory of 4552 4440 cmd.exe 117 PID 4440 wrote to memory of 3392 4440 cmd.exe 118 PID 4440 wrote to memory of 3392 4440 cmd.exe 118 PID 4440 wrote to memory of 3392 4440 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\d779c777a29f9250ff00ecbdc765c4c4.exe"C:\Users\Admin\AppData\Local\Temp\d779c777a29f9250ff00ecbdc765c4c4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 5882⤵
- Program crash
PID:1068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 6002⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 7762⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 8722⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 10522⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 10682⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 11082⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 10682⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2808 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\d779c777a29f9250ff00ecbdc765c4c4.exe" & start C:\Users\Admin\AppData\Local\ICBASM~1.EXE -f2⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 28083⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:4552
-
-
C:\Users\Admin\AppData\Local\icbasmyfv.exeC:\Users\Admin\AppData\Local\ICBASM~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 6364⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 8004⤵
- Program crash
PID:1032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 8204⤵
- Program crash
PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 8044⤵
- Program crash
PID:3608
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 9722⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2808 -ip 28081⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2808 -ip 28081⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2808 -ip 28081⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2808 -ip 28081⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2808 -ip 28081⤵PID:1448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2808 -ip 28081⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2808 -ip 28081⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2808 -ip 28081⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2808 -ip 28081⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3392 -ip 33921⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3392 -ip 33921⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3392 -ip 33921⤵PID:2532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3232 --field-trial-handle=3408,i,16599691418790971742,134777455365707676,262144 --variations-seed-version /prefetch:81⤵PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3392 -ip 33921⤵PID:2324
Network
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request91.16.208.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request91.16.208.104.in-addr.arpaIN PTR
-
142 B 135 B 2 1
DNS Request
41.110.16.96.in-addr.arpa
DNS Request
41.110.16.96.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
43.58.199.20.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
241.154.82.20.in-addr.arpa
DNS Request
241.154.82.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa
-
144 B 146 B 2 1
DNS Request
91.16.208.104.in-addr.arpa
DNS Request
91.16.208.104.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5d779c777a29f9250ff00ecbdc765c4c4
SHA18dfec79231cc8dcd8d310aac935eb00f396a2a35
SHA256ecd638f701bf62044f91a3179b4f1381c1195e053e976cdc29b4a89d625f30dd
SHA512b89889227782aec04df8080f2afb7aac3ab6badd1eb8c572df1f12503cc17f6cf931da403e878ac5b8f85daf54ed958952d614fdfe4f1162d51c51540da7fea4