Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
09221da26d60cc5991002bc477af3b20N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
09221da26d60cc5991002bc477af3b20N.exe
Resource
win10v2004-20240802-en
General
-
Target
09221da26d60cc5991002bc477af3b20N.exe
-
Size
268KB
-
MD5
09221da26d60cc5991002bc477af3b20
-
SHA1
6db7dce18278ac296984013ae6812ce16b62dce8
-
SHA256
bdfe6e1af0c22e5f08f8985ed10ed6079fea7da9118989f00412251d574fa1c5
-
SHA512
fd7de604d7686fe297494450809cefb03630cd0ed2f9c4a8931c69fce0a95110011cd45545212d86e7c4bb33ec28a92f4a289ce23ae04240e30afd0088da4ab4
-
SSDEEP
3072:IwiRPM/kufT8Vs3VjN2RQtCf/8PmX/lo7EOlPwUcDTM36RipZ3s2g:IzpM/k2ws3VWQo38PqyoZrRib
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 212 09221da26d60cc5991002bc477af3b20N.exe -
Executes dropped EXE 1 IoCs
pid Process 212 09221da26d60cc5991002bc477af3b20N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3248 2672 WerFault.exe 83 2832 212 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09221da26d60cc5991002bc477af3b20N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2672 09221da26d60cc5991002bc477af3b20N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 212 09221da26d60cc5991002bc477af3b20N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2672 wrote to memory of 212 2672 09221da26d60cc5991002bc477af3b20N.exe 91 PID 2672 wrote to memory of 212 2672 09221da26d60cc5991002bc477af3b20N.exe 91 PID 2672 wrote to memory of 212 2672 09221da26d60cc5991002bc477af3b20N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\09221da26d60cc5991002bc477af3b20N.exe"C:\Users\Admin\AppData\Local\Temp\09221da26d60cc5991002bc477af3b20N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 3962⤵
- Program crash
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\09221da26d60cc5991002bc477af3b20N.exeC:\Users\Admin\AppData\Local\Temp\09221da26d60cc5991002bc477af3b20N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 3723⤵
- Program crash
PID:2832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2672 -ip 26721⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 212 -ip 2121⤵PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD537941962d13339d369a4f1e0bf4589a2
SHA134b94d88e215f6fce62a63a1b9cf7c6f405c6ccc
SHA2566ac664ca40ae016fd44030e582fdcdecf6d22cd747f4de5d4040b87c2d31566f
SHA512ad2175ff7c8b88f5eb08a7c2e6d8a66d680d013215060bf55cc390734e3fcee5dbef580b3797d842d617cf421756330634a4f4bb61a7e23ba4351d144185d91d