Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe
Resource
win10v2004-20240508-en
General
-
Target
d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe
-
Size
2.4MB
-
MD5
db08feef352cb81eb2a058b6660c2155
-
SHA1
cf8768d3b7af310a92087f8045244ecfccd2729f
-
SHA256
d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48
-
SHA512
00010029d2552d6fd910238f4e3d44cebdb563a47195d9aca3fae08baf7a358aaf1c6f14c84b4035a72d6e81188595da2e4bdb66f291d29f52143a9c922cd012
-
SSDEEP
24576:jTTXB0woras9a/ZS7W+iniF+ujZXIMfX2av5SAODFDn:XT0rF9gMPiniXtXIMfX2wGBDn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2808 d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2452 4160 WerFault.exe 92 2176 2808 WerFault.exe 100 1696 2808 WerFault.exe 100 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4160 d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2808 d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 2808 4160 d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe 100 PID 4160 wrote to memory of 2808 4160 d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe 100 PID 4160 wrote to memory of 2808 4160 d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe"C:\Users\Admin\AppData\Local\Temp\d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 3442⤵
- Program crash
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exeC:\Users\Admin\AppData\Local\Temp\d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 3443⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 3603⤵
- Program crash
PID:1696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4160 -ip 41601⤵PID:784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2808 -ip 28081⤵PID:264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2808 -ip 28081⤵PID:4016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1036,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=3816 /prefetch:81⤵PID:4896
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d0dad2c74979a1cb3a0c4fe9435853698dfa1001992272622e624d6199b77f48.exe
Filesize2.4MB
MD5de62a878b757c861287d20eec52f653c
SHA15f3d36a2c66a4fc82fc02907d4e0e03887812272
SHA256ada60bc92c316b871f4b8e2ba38b6c7724017e62594ec79ea2d282068c0c1ac3
SHA51295647c861589094b78ae518df8bf2ebbfa16e468c2551ead8c457803472dc8b6475bd02728e3ef435ac738a6b2d2414243e4027cb49109d4f29c18de23c0cc71