Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3release_resources.iso
windows7-x64
3release_resources.iso
windows10-2004-x64
3out.iso
windows7-x64
1out.iso
windows10-2004-x64
1Setup.exe
windows7-x64
5Setup.exe
windows10-2004-x64
10accusal.xlsx
windows7-x64
1accusal.xlsx
windows10-2004-x64
1roc.png
windows7-x64
3roc.png
windows10-2004-x64
3tak_deco_lib.dll
windows7-x64
1tak_deco_lib.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
release_resources.iso
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
release_resources.iso
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
out.iso
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
out.iso
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
accusal.xlsx
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
accusal.xlsx
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
roc.png
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
roc.png
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
tak_deco_lib.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
tak_deco_lib.dll
Resource
win10v2004-20240709-en
General
-
Target
Setup.exe
-
Size
12.0MB
-
MD5
a7118dffeac3772076f1a39a364d608d
-
SHA1
6b984d9446f23579e154ec47437b9cf820fd6b67
-
SHA256
f1973746ac0a703b23526f68c639436f0b26b0bc71c4f5adf36dc5f6e8a7f4d0
-
SHA512
f547c13b78acda9ca0523f0f8cd966c906f70a23a266ac86156dc7e17e6349e5f506366787e7a7823e2b07b0d614c9bd08e34ca5cc4f48799b0fe36ac836e890
-
SSDEEP
98304:ReAtQzKADvk/9TEaImN9/tiHBIn8c3hCEFRUTaZnPZOtXwH:ReAOWOM/FE1mNHiFc3hr7UTaZnhOtXwH
Malware Config
Extracted
lumma
https://survivedosaz.shop/api
https://applyzxcksdia.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3952 set thread context of 1480 3952 Setup.exe 87 -
Program crash 2 IoCs
pid pid_target Process procid_target 1868 848 WerFault.exe 96 4216 848 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3952 Setup.exe 3952 Setup.exe 1480 cmd.exe 1480 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3952 Setup.exe 1480 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3952 wrote to memory of 1480 3952 Setup.exe 87 PID 3952 wrote to memory of 1480 3952 Setup.exe 87 PID 3952 wrote to memory of 1480 3952 Setup.exe 87 PID 3952 wrote to memory of 1480 3952 Setup.exe 87 PID 1480 wrote to memory of 848 1480 cmd.exe 96 PID 1480 wrote to memory of 848 1480 cmd.exe 96 PID 1480 wrote to memory of 848 1480 cmd.exe 96 PID 1480 wrote to memory of 848 1480 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 13764⤵
- Program crash
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 14364⤵
- Program crash
PID:4216
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 848 -ip 8481⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 848 -ip 8481⤵PID:3220
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1008KB
MD513f824c7dc5722a865925a4504cd793c
SHA1b337c3ec32b00e2b47b22b8279342bcb4490033f
SHA256fee7ce91f37025394ce83070d4948e8b44a543fd9687c94077c8c8aeb3e3b925
SHA5125632d3a70051e773ab002719feaebc18db275e4b54d4e5efdbc085fcfac3afdc9d59dcd017970388f547ad86c52e8a0c6a8955f15e64660c50960549d88ccbbd