Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
b63d1a558c34e46bb1e5fcfd705769d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b63d1a558c34e46bb1e5fcfd705769d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
b63d1a558c34e46bb1e5fcfd705769d0N.exe
-
Size
202KB
-
MD5
b63d1a558c34e46bb1e5fcfd705769d0
-
SHA1
72f359d2415418889438d6713249638a7ff48051
-
SHA256
5388419953aa5109f56f12fa71322acced8a81ca623c5c987701ef514204ba00
-
SHA512
f5fefa5529853879c2147a515452a8b359781fe5b1155f7576201427960f5d27042e53c21f43fbc65a70fcfdf3a99867c1ac531c09fe2d3a5e802115f7dc30f6
-
SSDEEP
6144:p6MPejMRxxZY69fesmvOW5Ps9Huhk1sTAitD8FhQwrM46shbc500RXqX+ZyJXSzL:pfTxR9msoOwPWOhXrP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1316 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1316 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1168 4264 WerFault.exe 83 4688 1316 WerFault.exe 91 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4264 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1316 b63d1a558c34e46bb1e5fcfd705769d0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4264 wrote to memory of 1316 4264 b63d1a558c34e46bb1e5fcfd705769d0N.exe 91 PID 4264 wrote to memory of 1316 4264 b63d1a558c34e46bb1e5fcfd705769d0N.exe 91 PID 4264 wrote to memory of 1316 4264 b63d1a558c34e46bb1e5fcfd705769d0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b63d1a558c34e46bb1e5fcfd705769d0N.exe"C:\Users\Admin\AppData\Local\Temp\b63d1a558c34e46bb1e5fcfd705769d0N.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 3962⤵
- Program crash
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\b63d1a558c34e46bb1e5fcfd705769d0N.exeC:\Users\Admin\AppData\Local\Temp\b63d1a558c34e46bb1e5fcfd705769d0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 3683⤵
- Program crash
PID:4688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4264 -ip 42641⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1316 -ip 13161⤵PID:2760
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5b3649f096350cdc0a176786ce1f66b39
SHA14ae902733d903b98b337e2565fdb76b1f3c95d94
SHA256ee28b734f11f37d847cb8cb014098ec499dc15a22664b37fdd1d9aafa6645c84
SHA51274b374e1dfd21edae36043e8418018006c6122f7d74554f078e714cf28be33da51139dc2f06dc765370aa523d6edf1d13798bf96fee7a43fc3d297490292d853