Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/06/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe
Resource
win10v2004-20240508-en
General
-
Target
6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe
-
Size
256KB
-
MD5
a735f1c4d0b1a8f8a57b9f6cc21c4d5d
-
SHA1
ca2f6b0b9f35bfd3342c041dbcae64e55df2197f
-
SHA256
6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f
-
SHA512
0c221c8a437cd267dccd8b31a50851bc292fa9d772b4e9f63f76997c3dc0b91c90c17399c9719e40fe15ee6d15af02e3194f95e45684f6c0ddbaed11272f3970
-
SSDEEP
6144:aBWIqEf6AAlZVZdLS+8Zg6S1dqShh2+SZx79H0W7cyqCxSng7:4WIz6AATVZdLOgT6R7j0nk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1656 6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe -
Executes dropped EXE 1 IoCs
pid Process 1656 6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 4380 1232 WerFault.exe 87 4608 1656 WerFault.exe 91 2464 1656 WerFault.exe 91 1860 1656 WerFault.exe 91 1232 1656 WerFault.exe 91 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1232 6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1656 6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1656 1232 6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe 91 PID 1232 wrote to memory of 1656 1232 6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe 91 PID 1232 wrote to memory of 1656 1232 6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe"C:\Users\Admin\AppData\Local\Temp\6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 3842⤵
- Program crash
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exeC:\Users\Admin\AppData\Local\Temp\6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 3523⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 7723⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 5443⤵
- Program crash
PID:1860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 8083⤵
- Program crash
PID:1232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1232 -ip 12321⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1656 -ip 16561⤵PID:1244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4184,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4232 /prefetch:81⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1656 -ip 16561⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1656 -ip 16561⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1656 -ip 16561⤵PID:3864
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6c4f48a92a88dd72d6e92aaaebb8d674ca6bb3263999bda5d663791f89d28e9f.exe
Filesize256KB
MD52feefa65d8c999e62667e64d628f6eae
SHA10983c76ca6f043ef0c8128aa678009aa5392e41c
SHA25648b45ebf645386f162f05ab6fb668d1586cce132199dc8b634dba404376b0474
SHA51279bc3a4558821fc73ba650da92986e6fd05f39a1e05b1e2eb28d373dd12e797e0824b302b459a6ad29093be2d2fb095463a5c9b3b056e28e62680a7b43302109