Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 16:50 UTC
Static task
static1
Behavioral task
behavioral1
Sample
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
Resource
win10v2004-20240226-en
General
-
Target
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
-
Size
1.2MB
-
MD5
de7b4c9c5c29ab6cdcf1e30bbe7fc25f
-
SHA1
5941c112ffcbe6b197b919803ab81d486625fd82
-
SHA256
ce7b09524d97403326d9d1921decc7091583e257dcb529fd84d538264a9a7221
-
SHA512
aef6c1190b4b65510234150e43b39c808c082759f6cef246bcee430d2984b9ee55a185a0dad17fbd6e9cba19d55eac83d14a46018978f5ddca95dd997f6db341
-
SSDEEP
24576:iLMiACnO3AuyyoSY5ZOA4+Py3aJ3ozQmXmYtfujO:RBIOtpoS7AJPjFoEmX+O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1660 ¸´¼þ4~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3552 1660 WerFault.exe 89 4452 1660 WerFault.exe 89 3196 1660 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1660 3632 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 89 PID 3632 wrote to memory of 1660 3632 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 89 PID 3632 wrote to memory of 1660 3632 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe"C:\Users\Admin\AppData\Local\Temp\de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ4~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ4~1.EXE2⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2203⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2283⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2563⤵
- Program crash
PID:3196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1660 -ip 16601⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1660 -ip 16601⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1660 -ip 16601⤵PID:1664
Network
-
Remote address:8.8.8.8:53Request64.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request185.178.17.96.in-addr.arpaIN PTRResponse185.178.17.96.in-addr.arpaIN PTRa96-17-178-185deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request185.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request81.171.91.138.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.171.91.138.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request34.56.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request34.56.20.217.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request210.178.17.96.in-addr.arpaIN PTRResponse210.178.17.96.in-addr.arpaIN PTRa96-17-178-210deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request192.178.17.96.in-addr.arpaIN PTRResponse192.178.17.96.in-addr.arpaIN PTRa96-17-178-192deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTR
-
72 B 158 B 1 1
DNS Request
64.159.190.20.in-addr.arpa
-
144 B 137 B 2 1
DNS Request
185.178.17.96.in-addr.arpa
DNS Request
185.178.17.96.in-addr.arpa
-
219 B 147 B 3 1
DNS Request
133.211.185.52.in-addr.arpa
DNS Request
133.211.185.52.in-addr.arpa
DNS Request
133.211.185.52.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
241.154.82.20.in-addr.arpa
DNS Request
241.154.82.20.in-addr.arpa
-
142 B 135 B 2 1
DNS Request
41.110.16.96.in-addr.arpa
DNS Request
41.110.16.96.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
205.47.74.20.in-addr.arpa
DNS Request
205.47.74.20.in-addr.arpa
-
144 B 146 B 2 1
DNS Request
81.171.91.138.in-addr.arpa
DNS Request
81.171.91.138.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
142 B 131 B 2 1
DNS Request
34.56.20.217.in-addr.arpa
DNS Request
34.56.20.217.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
210.178.17.96.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
192.178.17.96.in-addr.arpa
-
216 B 158 B 3 1
DNS Request
22.236.111.52.in-addr.arpa
DNS Request
22.236.111.52.in-addr.arpa
DNS Request
22.236.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD5cdb5b0b5f855207097d7e3dd85a7510f
SHA1427674a461e5273bbfe40a17c5a6feca32105b9b
SHA256c1f253144d4b16e9e1b2a6fb1e95fd01f7c9f20a0397856e96305ddd26c5ec22
SHA5129d9f302cdb6686ffa2a34824fd50ddd4b0cff566b8d63fab3e60a12928467e79aa364528d699faa86144719ae191ec2f9d95597e8b3b84c6ce1329258c210509