Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe
Resource
win7-20240704-en
General
-
Target
a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe
-
Size
593KB
-
MD5
ca61c16bb94540662facaa6cf7f317f8
-
SHA1
6fd5af916972136da2bcefb6188d1c11c905ed41
-
SHA256
a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9
-
SHA512
a41ebbe793b3d234921656b6ef3df75e500bb115ce3788e1bb4bc57ebda2de0dcbcdea24b51b53d8343e3b60977d2a57c577aef03613694d2c0a7346bac6eb5f
-
SSDEEP
12288:1oGrkCEw+Is4l8O3d5Gu8y5pSqgsZsFKSB82MiEhB:1oGI3w1l8Ot5Gvy5DKEdB
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4964 powershell.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\playgoers.sep a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File created C:\Windows\SysWOW64\bores.lnk a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File opened for modification C:\Windows\SysWOW64\bores.lnk a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File created C:\Windows\SysWOW64\Pentose.lnk a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File opened for modification C:\Windows\SysWOW64\Pentose.lnk a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Pygopagus172\matthfus.ala a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File opened for modification C:\Program Files (x86)\Common Files\lnstigningsmnstre\Ccny.sta a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File opened for modification C:\Program Files (x86)\Common Files\Vaginismus.ini a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File opened for modification C:\Program Files (x86)\Common Files\nvningedomstol\arbejdskommando.sto a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\ejerlst.uns a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File opened for modification C:\Windows\resources\fysiurg\Cheesecutter.ini a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File opened for modification C:\Windows\yer.ini a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe File opened for modification C:\Windows\truthlessly\Stablish.ini a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4148 4964 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4964 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4964 4868 a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe 86 PID 4868 wrote to memory of 4964 4868 a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe 86 PID 4868 wrote to memory of 4964 4868 a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe 86 PID 4964 wrote to memory of 2484 4964 powershell.exe 90 PID 4964 wrote to memory of 2484 4964 powershell.exe 90 PID 4964 wrote to memory of 2484 4964 powershell.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe"C:\Users\Admin\AppData\Local\Temp\a040ff5358e881adf59b8446ebdbb987a486c4fe90e2f1d64a5b9abadd550fd9.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Undiaphanousness=Get-Content 'C:\Users\Admin\AppData\Local\Temp\fingerstningerne\flagellulae\Rouilles\Effektiviseret.Dia';$Trafikflyene=$Undiaphanousness.SubString(51750,3);.$Trafikflyene($Undiaphanousness)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 26203⤵
- Program crash
PID:4148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4964 -ip 49641⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
50KB
MD5fd91c54cfd0dc5ffb898c8c6f497eb88
SHA1c4ffcd13c0a7e9bf4811c19d969cdd6adae83926
SHA256d947ac7f9b2519129e2352c38fef03524c8ea3abfccc968cee8fad3539508cd1
SHA5127075cd28627540323a1212f677b4a8bff6945960e2ff71d6bcd4f4ea68db625b51017c9841fd1db06f156e327fcdc647391ae7d30af3a4fe60dd3be4083b0616
-
Filesize
1KB
MD58596e5752ee687d758697fbeaafffefc
SHA142f4fa9a196c5f86250d6e2cee4ce5b28894d5f8
SHA2561755bbecc5bd03844ffc5bc7f509e30bef2620540f5d3e0c70280d6546f6a150
SHA51245d5715f413de60b0ae8b1eeee620661d11dcb5dce7ac480d5f7ffc8a69ff6e0fdd00ae349d9a1b2faab560e7a94ee2e600491f74d3317bb0715d876fa65f2f8
-
Filesize
38B
MD5e58f8a2dcf15a626bc785906a24d269a
SHA1451f8692070432dbd0232c61631cb49874323fd7
SHA25639b313e3f6e503de2657691e96235891834d12dab42957e62aea1c588c35bc83
SHA5127c33aec2758c72eb727f156ca5946626409a1b2ad22a980801436acacac1bf05eac231a2a0cc2858d369a54cbfa3cafdbd449ce696bf6c8fcecfb53699a75bd3