Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
de49b9addcc48e5c3ccc9c9141435442.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de49b9addcc48e5c3ccc9c9141435442.exe
Resource
win10v2004-20240226-en
General
-
Target
de49b9addcc48e5c3ccc9c9141435442.exe
-
Size
813KB
-
MD5
de49b9addcc48e5c3ccc9c9141435442
-
SHA1
0862a5a51021a2ae17669367608ba22d62dd6cc1
-
SHA256
1b14147fe3404fe13bb4b845c60ab46b98b0b37b2124dd954503abe9be3c8604
-
SHA512
5d4624ab5eabddef5cfeac472fba68076cca0cc2561932c61d629014ed835a9f836e4fa5fd36f3bd31373ae65d5dc7e1b312154f101c6b4e3eeee6cd26c9ea8a
-
SSDEEP
12288:lmnrwxsroXXhCnNqGgxANeLE1sNs9J5YtN33xRpFhuMRuCH2F4:lMkxsroXXuNRg6EJNr3xRpXwY2F4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1368 1344 WerFault.exe 87 1824 1344 WerFault.exe 87 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 de49b9addcc48e5c3ccc9c9141435442.exe 1344 de49b9addcc48e5c3ccc9c9141435442.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de49b9addcc48e5c3ccc9c9141435442.exe"C:\Users\Admin\AppData\Local\Temp\de49b9addcc48e5c3ccc9c9141435442.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 22122⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 21642⤵
- Program crash
PID:1824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1344 -ip 13441⤵PID:316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1344 -ip 13441⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WebInstaller_CE83722B568A439E8AD425B8C9794F1F\WebInstaller_1344.log
Filesize6KB
MD522be9933f10afaa86da1d3158b5b5b9e
SHA16d17149aa7b76b667c9a7f3c293090f58ceaf682
SHA256cc975ed103b33c6266c9416ee56196f840c45764b2cbe30d44a3530d947f6661
SHA512117e3b085cf8d12fe9866f3a7d43581fad1b315a9c2c21667da39e1415ef319a7ee52387291550297d34bcdc8f53c3c538ede609e937d0d368fc1ce3f6841ea8
-
Filesize
457KB
MD5e09ed04da7c88c2649a84924f25ec442
SHA1926eda1eea5ce401cae785dacf76013c419e615c
SHA2566511aa7386edeaa7c90d8685d0da04d4d5566d0616232fc67ad14d0c9a07db20
SHA512fbc16a2f83ae171a31b369bb7be4dd5718e43a91f6991c9fca6d998684bd40254ffb876c370121b1e126fb5f0c366610d49e0e72d114bdf9e76da89dd47af50a