Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 03:34

General

  • Target

    d070db278bf368da6287a46f5f9a5a556df5756447fea3cf724a5fee2da1e2ad.exe

  • Size

    256KB

  • MD5

    34a75983f1e38c4748e2d914a611dc9b

  • SHA1

    ae93fe5254c4bd5fbd7c0704df7879adcca5db62

  • SHA256

    d070db278bf368da6287a46f5f9a5a556df5756447fea3cf724a5fee2da1e2ad

  • SHA512

    6f6e48607ef5f07ffc3eae11f3c606123877ff5c3f6daa1d1dc1645393ede890d10986c5de64b0c71cc13b81ac0f4e44b0ee251eab72a647c2783e0688368df0

  • SSDEEP

    3072:0OBcWZWYl3oaSYwS0EdK+0WaiRuksikJk7qqSoQMzcJ7HQJPvAvAahrWjvQfxVOv:041Zz4ywSeuPGk7q2QVWPvA/FevYV40o

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d070db278bf368da6287a46f5f9a5a556df5756447fea3cf724a5fee2da1e2ad.exe
    "C:\Users\Admin\AppData\Local\Temp\d070db278bf368da6287a46f5f9a5a556df5756447fea3cf724a5fee2da1e2ad.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 396
      2⤵
      • Program crash
      PID:3968
    • C:\Users\Admin\AppData\Local\Temp\d070db278bf368da6287a46f5f9a5a556df5756447fea3cf724a5fee2da1e2ad.exe
      C:\Users\Admin\AppData\Local\Temp\d070db278bf368da6287a46f5f9a5a556df5756447fea3cf724a5fee2da1e2ad.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 364
        3⤵
        • Program crash
        PID:3476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2376 -ip 2376
    1⤵
      PID:2500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4420 -ip 4420
      1⤵
        PID:1468

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\d070db278bf368da6287a46f5f9a5a556df5756447fea3cf724a5fee2da1e2ad.exe

        Filesize

        256KB

        MD5

        42d2d425748f8c6788fd2e049e0965ad

        SHA1

        c2fa18fe0256a41e1e4e92c00aeb25f3bc31c7c7

        SHA256

        9e5e40d0f4e35a6912bc755282b03d6e965515443e6b6d548268aa1ba6cd8577

        SHA512

        56653be9aa88c78691221c2845058bf9d50c9b6565b8f9fbb55ccbf0cd3798a1e9fd648b0d34c825ddfe81b69230170143f08c0c70d85334af88696921844ed4

      • memory/2376-0-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2376-7-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/4420-8-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/4420-9-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/4420-14-0x0000000001450000-0x0000000001492000-memory.dmp

        Filesize

        264KB

      • memory/4420-15-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB