Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
7d89d473d7d5197aa0c44c01eb69d620N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7d89d473d7d5197aa0c44c01eb69d620N.exe
Resource
win10v2004-20240802-en
General
-
Target
7d89d473d7d5197aa0c44c01eb69d620N.exe
-
Size
384KB
-
MD5
7d89d473d7d5197aa0c44c01eb69d620
-
SHA1
d2df580e34d72d8829e0d00f29586a1026c10416
-
SHA256
21b32a1e3ba18f9c1600a5f093a528668a93dacbe09526f4cb2fdae76b1eea13
-
SHA512
f11221e952eef6b1ed43d02e95695485adea987ecbae4d503cdd6e56757cb10acde9efeec1d57266224e5acf61036a339f6093b4585619f2e46ed654dca57ae3
-
SSDEEP
6144:bfb4EjyM6ro0dk46MKq8l/UdpWdDJboY4sJ9pALL7j11:bfsEO9o0e46MKq8l/Udp6D9d9pAX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3928 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Executes dropped EXE 1 IoCs
pid Process 3928 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2084 3436 WerFault.exe 82 2200 3928 WerFault.exe 89 712 3928 WerFault.exe 89 2268 3928 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d89d473d7d5197aa0c44c01eb69d620N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3436 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3928 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3436 wrote to memory of 3928 3436 7d89d473d7d5197aa0c44c01eb69d620N.exe 89 PID 3436 wrote to memory of 3928 3436 7d89d473d7d5197aa0c44c01eb69d620N.exe 89 PID 3436 wrote to memory of 3928 3436 7d89d473d7d5197aa0c44c01eb69d620N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d89d473d7d5197aa0c44c01eb69d620N.exe"C:\Users\Admin\AppData\Local\Temp\7d89d473d7d5197aa0c44c01eb69d620N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 3842⤵
- Program crash
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\7d89d473d7d5197aa0c44c01eb69d620N.exeC:\Users\Admin\AppData\Local\Temp\7d89d473d7d5197aa0c44c01eb69d620N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 3523⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 7683⤵
- Program crash
PID:712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 7883⤵
- Program crash
PID:2268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3436 -ip 34361⤵PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3928 -ip 39281⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3928 -ip 39281⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3928 -ip 39281⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5a56541ea1836dc38b9beb9ad40a0fcf7
SHA1e188595dfc70fda2e092f066d11ae638acfcd5ed
SHA256c9fcf1eb3d72a40986a805f2fc40e80e0193b7fc767d022b5bb52dccbf618318
SHA51279f5f4b87d7d36325ad1b7e0e721139c60ac24f84013e11980558e5e9e7f48ff70c3dde4ca6c9bb4b3bf3ee6e59f1b7669e4b1817c8ec7b3f8c8555a4a73f7b4