Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe
Resource
win10v2004-20240426-en
General
-
Target
ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe
-
Size
704KB
-
MD5
81ec444fa9daea3539d7e7cfe8c966b9
-
SHA1
a45f0519958dcf7977dd6a256e864194076910dd
-
SHA256
ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795
-
SHA512
ade8c6aafeb119eea02057e304a5075255c579cf5913a1b08cd2319b600cf5b2621b60df7bc3aa4f4828e0ad9182464db04c681227bd0fa327616db7dc33a0dc
-
SSDEEP
12288:jYV5bBqX9aLisvNeOVQ5zCD4TyWN9VysX7rdGrr5MSEJRrv1:jYjBqX9aLisvNeOVQ5zY4xN9VyUGEJR5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1460 ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe -
Executes dropped EXE 1 IoCs
pid Process 1460 ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 464 5084 WerFault.exe 79 3260 1460 WerFault.exe 84 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5084 ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1460 ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1460 5084 ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe 84 PID 5084 wrote to memory of 1460 5084 ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe 84 PID 5084 wrote to memory of 1460 5084 ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe"C:\Users\Admin\AppData\Local\Temp\ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 3962⤵
- Program crash
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exeC:\Users\Admin\AppData\Local\Temp\ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 3643⤵
- Program crash
PID:3260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5084 -ip 50841⤵PID:832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1460 -ip 14601⤵PID:1144
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ae82db041f137a5ad9edd641bbf72b8609ed1281868fc8acf97725d40d7dc795.exe
Filesize704KB
MD58465e6997502fd2cc9175ab94a9a226e
SHA122a8e6b0cd0d1a856ea9cb9f41533b5197d2cd80
SHA256518629889d595bce0dc1d115d5ce2e9bf546ce327ef0dadc440c38e21515e667
SHA512d667d71664d9d39978a438bdae1aac1b23cc1507c719f3de262270aea92af8d703f4c449b1086de95c6da9824b423796a176dfaa2628f721ca31767428323449