Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
109s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
f4232d9627a803e17b38b3a646de9920N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f4232d9627a803e17b38b3a646de9920N.exe
Resource
win10v2004-20240802-en
General
-
Target
f4232d9627a803e17b38b3a646de9920N.exe
-
Size
209KB
-
MD5
f4232d9627a803e17b38b3a646de9920
-
SHA1
464b36b891be50fad88081d570e43c9dcd9be444
-
SHA256
a6063839433d518acd5f4089118ca50b7348356ca1d6675f4f5bddcd36a2fdd1
-
SHA512
92971801c7754ff0e2141d8dd41f65c277585d9d2857d6583e898bdefe766bf28b0fe7fa806736137b4d200184a64ac6e51bf94c4e221124b1412397bc7a82ca
-
SSDEEP
6144:EhXMue9Nam9u6uwhXEIzPJoZp8QK5bzqwaiOLWVtfXp:EhXMue9cuu6uwZOpyEiZtfp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4968 f4232d9627a803e17b38b3a646de9920N.exe -
Executes dropped EXE 1 IoCs
pid Process 4968 f4232d9627a803e17b38b3a646de9920N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2288 4480 WerFault.exe 82 2340 4968 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4232d9627a803e17b38b3a646de9920N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4480 f4232d9627a803e17b38b3a646de9920N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4968 f4232d9627a803e17b38b3a646de9920N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4968 4480 f4232d9627a803e17b38b3a646de9920N.exe 90 PID 4480 wrote to memory of 4968 4480 f4232d9627a803e17b38b3a646de9920N.exe 90 PID 4480 wrote to memory of 4968 4480 f4232d9627a803e17b38b3a646de9920N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4232d9627a803e17b38b3a646de9920N.exe"C:\Users\Admin\AppData\Local\Temp\f4232d9627a803e17b38b3a646de9920N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 3962⤵
- Program crash
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\f4232d9627a803e17b38b3a646de9920N.exeC:\Users\Admin\AppData\Local\Temp\f4232d9627a803e17b38b3a646de9920N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 3683⤵
- Program crash
PID:2340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4480 -ip 44801⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4968 -ip 49681⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD573b50996883294e6a25beeeb66b68b33
SHA1feb8de8e463e5f70fdc58550461c853ff8297739
SHA256a860b4886b7b31af58dcff3d3e484cd0636d917dc58b13972cf7071979e31252
SHA5122d237863b5521b305b3d9d0f6e55d60d0f615aa70e942a61f5d18d82132b6ab3db894719d183f3ca0b4e7191427b90c457d244ce2d895f00cd2ce71072c3780b