Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe
Resource
win10v2004-20240802-en
General
-
Target
d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe
-
Size
268KB
-
MD5
0f76646adb9a2953208ea8ded14c0caf
-
SHA1
7712afb6aa26caae8a1b821c5ebb25f5da14331e
-
SHA256
d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628
-
SHA512
fd9f8e4a397a0b8d8f072aafba8c8d2ac613b61528b7378a9d9b248847ae4c4057c2733cea15c58d29bc05b7859298f753376da7c9fd28196f1e315707969040
-
SSDEEP
3072:8T1No3t8FrbbjOeWTKP3ovFw5ZzqCU09aI2wEG2STOl7fIgAiK:qgaS7eodyZzqen2xG2SefA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4932 d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe -
Executes dropped EXE 1 IoCs
pid Process 4932 d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3904 4168 WerFault.exe 82 2432 4932 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4168 d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4932 d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4168 wrote to memory of 4932 4168 d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe 90 PID 4168 wrote to memory of 4932 4168 d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe 90 PID 4168 wrote to memory of 4932 4168 d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe"C:\Users\Admin\AppData\Local\Temp\d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 3962⤵
- Program crash
PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exeC:\Users\Admin\AppData\Local\Temp\d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 3643⤵
- Program crash
PID:2432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4168 -ip 41681⤵PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4932 -ip 49321⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d30e96a4416ee82ceb509740d02f54cf1c57e4a02e08e10812c6d1a95519f628.exe
Filesize268KB
MD518e62556594e20b761884220c09dcc4c
SHA1702009eb87cddab954977ce481619c4895c5f6e6
SHA256a1bd041b1ce046cf1bb39202f73284bff51942c614e8c906bc36f92891593c1e
SHA5127a952f8a2776d45225171f22c2dda8d22d6e78de64fae8c340716eeec1547207ba93405afced5067263a5b359f57852795d5bc93e6083ec93da58759c024aa36