Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 05:02

General

  • Target

    c7a37f5f3a469e770ea2221219260b2b51f2135dcefd1a6c61f990c40f436b13.exe

  • Size

    220KB

  • MD5

    21d0f7ebe343a7b5f19718bbfb4710e9

  • SHA1

    d2a6e322222951b588eb77155b5a10b315cf1ca8

  • SHA256

    c7a37f5f3a469e770ea2221219260b2b51f2135dcefd1a6c61f990c40f436b13

  • SHA512

    281c75cb37ee372b74eed8970479dd4f8cd931b3fd3feb5a4f5656ea637d2d0233f1604edb39e7863061afaf8e21dea32e56291988c5291715be0630c86aae4e

  • SSDEEP

    6144:wtnHrrVzr4D/0SZHXEpX/rA/tFhvsMLcXVC:Ch/4DVZ3EdQFhkMMVC

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7a37f5f3a469e770ea2221219260b2b51f2135dcefd1a6c61f990c40f436b13.exe
    "C:\Users\Admin\AppData\Local\Temp\c7a37f5f3a469e770ea2221219260b2b51f2135dcefd1a6c61f990c40f436b13.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 396
      2⤵
      • Program crash
      PID:3984
    • C:\Users\Admin\AppData\Local\Temp\c7a37f5f3a469e770ea2221219260b2b51f2135dcefd1a6c61f990c40f436b13.exe
      C:\Users\Admin\AppData\Local\Temp\c7a37f5f3a469e770ea2221219260b2b51f2135dcefd1a6c61f990c40f436b13.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:228
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 372
        3⤵
        • Program crash
        PID:1608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3244 -ip 3244
    1⤵
      PID:2724
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 228 -ip 228
      1⤵
        PID:1840

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\c7a37f5f3a469e770ea2221219260b2b51f2135dcefd1a6c61f990c40f436b13.exe

        Filesize

        220KB

        MD5

        c1f21602a33b5abbb49d8b93564a8a82

        SHA1

        48a007bfa7d9dc5a2b8d861882c578dfa889719f

        SHA256

        2de538b591e51c5dcc74fa1470d24421567bdd0e639b89b12115d5d8f9d4411e

        SHA512

        fef01b5221cf89029a76c37fef96ce44247d403159152405138986be7705a2df62af6ef439617e6df66feb2a34e250348092815376a731737a42a0b2fcbd2155

      • memory/228-6-0x0000000000400000-0x0000000000437000-memory.dmp

        Filesize

        220KB

      • memory/228-9-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/228-14-0x0000000003D60000-0x0000000003D97000-memory.dmp

        Filesize

        220KB

      • memory/228-15-0x0000000000400000-0x0000000000437000-memory.dmp

        Filesize

        220KB

      • memory/3244-0-0x0000000000400000-0x0000000000437000-memory.dmp

        Filesize

        220KB

      • memory/3244-8-0x0000000000400000-0x0000000000437000-memory.dmp

        Filesize

        220KB