Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
Resource
win10v2004-20240508-en
General
-
Target
3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
-
Size
223KB
-
MD5
cc6f609429a9b8e9d8d219043d3bcb3d
-
SHA1
5e97db48a9a27207acb43c7375d48aed775dd3d9
-
SHA256
3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb
-
SHA512
8edd31737b357ea2d0cf542a64bb3fbb4534e3ba798dae74729ab419eed989d2e6d36f6a69b217900c72796e95f2855407a82eebd7d3e63bc048712427ae8ec0
-
SSDEEP
6144:UIve6ZsqJM8dyO6WXKGHaN64aMw9G4VwpOv0JgkmUWd:UUZJME3cGx4l42pOv4goWd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1412 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Executes dropped EXE 1 IoCs
pid Process 1412 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3264 2436 WerFault.exe 81 3308 1412 WerFault.exe 89 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2436 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1412 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1412 2436 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe 89 PID 2436 wrote to memory of 1412 2436 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe 89 PID 2436 wrote to memory of 1412 2436 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe"C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 3962⤵
- Program crash
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exeC:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 3643⤵
- Program crash
PID:3308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2436 -ip 24361⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1412 -ip 14121⤵PID:1316
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
Filesize223KB
MD5565a6181478e731782311650cd182d32
SHA18d01f8da420a4d1a57986b8177c466cecadca265
SHA256ed231e623cfafb08a43f1d2926cff4ac2f93031dd7cbd0215a220051fd5dde73
SHA5126cf6b44ea2337c8e9cd632c9cefa0421fe21da8c26b4305eeb246669a31b43690cb63177f7d681fd2a0a341a4fc8f49b247e2aaac336cfa13d3414e4f3f0af34