Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 20:00

General

  • Target

    211e172d4e6767844b351e65796b89680094f6833ad4fad363cdd995fe5fc5c2.exe

  • Size

    202KB

  • MD5

    756e5968011596649c0a07c23f3ca702

  • SHA1

    ed745a4c07c254fa119854ee5ef533e7873360b6

  • SHA256

    211e172d4e6767844b351e65796b89680094f6833ad4fad363cdd995fe5fc5c2

  • SHA512

    f4ee57acff0f71beefbc7ab37591c202f39e6ed8d62a4a3ba8497694117e467420c67022aaf159e81bd1faf57228edee96236b8111ccc2acddeb37c97eb8d6b8

  • SSDEEP

    3072:GUMTrOzktXOYlwTFf56LM+H1kRY4sbQfJnSIET8ZXawu0U5q8Vc4qQZAVvzP:STrOUOZ8LMPYRbQfJuwBrP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\211e172d4e6767844b351e65796b89680094f6833ad4fad363cdd995fe5fc5c2.exe
    "C:\Users\Admin\AppData\Local\Temp\211e172d4e6767844b351e65796b89680094f6833ad4fad363cdd995fe5fc5c2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 396
      2⤵
      • Program crash
      PID:1648
    • C:\Users\Admin\AppData\Local\Temp\211e172d4e6767844b351e65796b89680094f6833ad4fad363cdd995fe5fc5c2.exe
      C:\Users\Admin\AppData\Local\Temp\211e172d4e6767844b351e65796b89680094f6833ad4fad363cdd995fe5fc5c2.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:5048
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 368
        3⤵
        • Program crash
        PID:4292
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4304 -ip 4304
    1⤵
      PID:2840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5048 -ip 5048
      1⤵
        PID:3464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\211e172d4e6767844b351e65796b89680094f6833ad4fad363cdd995fe5fc5c2.exe

        Filesize

        202KB

        MD5

        91f3dad471f00c99a6d823ed78a0b2ec

        SHA1

        0143e69a50b3fb251788abb056e4633a5efb728a

        SHA256

        3e71391a0454cbf0fd9c22d094f984cd8d9a21517df71be0e34e5066bd8062e8

        SHA512

        9a339af76334e529325d9ba3eed4da463f05d02d89c0e5370cf72194a7e3b5ba1e58b1fe4cf60ca5f18bdd93dd403871df98713f4501aaed57a95bc9a25c90ff

      • memory/4304-0-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4304-6-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5048-7-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5048-8-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/5048-13-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/5048-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB