Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
PO Tournefortian2453525525235235623425523235.exe
Resource
win7-20240708-en
General
-
Target
PO Tournefortian2453525525235235623425523235.exe
-
Size
855KB
-
MD5
d332bcaa3c61494b774f49bf3e716c21
-
SHA1
8cdfa60c6b3f25c7d48753e50c298b746c3386de
-
SHA256
d61208c85ce83c279dd87495f0dfc1cf5c345d2bf3a6e739279dcf188e19b21d
-
SHA512
40a405252934e0ece7e24514bf041674c84559d94f0791183c77268e154387ac8c452838237c33f55434a3eb04c8f47e818f9d7172cc5295ef9af86e92f80942
-
SSDEEP
12288:R3IpD7+TUoYhjjPDU6dK7UVEnNH8nUg1EbV3O9XqOqLI4VpStZB:R3IUwHhjjPVdK7UVEp8nU6C2qOaUB
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4488 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3300 4488 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO Tournefortian2453525525235235623425523235.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4488 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3852 wrote to memory of 4488 3852 PO Tournefortian2453525525235235623425523235.exe 85 PID 3852 wrote to memory of 4488 3852 PO Tournefortian2453525525235235623425523235.exe 85 PID 3852 wrote to memory of 4488 3852 PO Tournefortian2453525525235235623425523235.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO Tournefortian2453525525235235623425523235.exe"C:\Users\Admin\AppData\Local\Temp\PO Tournefortian2453525525235235623425523235.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Typograferer=Get-Content 'C:\Users\Admin\AppData\Local\efterplaprernes\Shakya\memorized\Heptandrous.Arr';$Anskueliggjordes=$Typograferer.SubString(51945,3);.$Anskueliggjordes($Typograferer)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 26843⤵
- Program crash
PID:3300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4488 -ip 44881⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
50KB
MD529746f3c54388a9f4917e4be34f35b22
SHA11c8099ced377bccba4f56b6e946993bd3f9e8174
SHA2564caa1d9b0c1a2a8c5b4357ed868a0b15caab2769ef85d72448a602e55de57358
SHA512a02df71e19afb0e790b5cd28fb2cc0622236aa3f30ca52d02b73028985df4b4560eeb91fdca54b80df23114751dc121348c1d18db61a053d36c7fbe3d0b2af40