Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 18:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NeverLose.exe
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
NeverLose.exe
-
Size
1.2MB
-
MD5
bb5a7414d8e9eed4ae56984ea9e5d326
-
SHA1
44b72cdccdf5c4a685ba6f13baa1ed8999286cd4
-
SHA256
0b5aaa2bbba71e9c37da4e3819a6a878955e0acc8bc199b247a586283e13b9f2
-
SHA512
010b10795950d939e446244828fb56e1bd0cc4dc714733cfcdf1b09a946dacf75708ae9456ced2d6e3eb5e7bf3b062afdd738a7abbcfe2b49212bb1eee199ad1
-
SSDEEP
24576:WDmJmqp/bF9xRL+Ab3zYaiYpUjNRgVztW:WKXF9xRL+Au5NmZ
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1388 set thread context of 4180 1388 NeverLose.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 4600 1388 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NeverLose.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84 PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84 PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84 PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84 PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84 PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84 PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84 PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84 PID 1388 wrote to memory of 4180 1388 NeverLose.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\NeverLose.exe"C:\Users\Admin\AppData\Local\Temp\NeverLose.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 3362⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1388 -ip 13881⤵PID:3620