Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
f7e91871b8b95a333b4663a348bedeb0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f7e91871b8b95a333b4663a348bedeb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f7e91871b8b95a333b4663a348bedeb0N.exe
-
Size
209KB
-
MD5
f7e91871b8b95a333b4663a348bedeb0
-
SHA1
cb7978c5e8af1d887a5735f7cd2c11c689785a84
-
SHA256
ce80de26cdd2e615aae170d6baedd96053d1f4506e7b02a3e439b3d1a530cef5
-
SHA512
5952c69ca86d537c8fe5a87d2d79da60812f263404a01f5afc1ea05639c0079e5555e29a89a4120fd5e44c5a82cb754820fc774ef5d0bf052e0ae5f4eb637ec0
-
SSDEEP
3072:5KWXbaM34c5m76AZuTLuAaO0fWPtErqdSSjN37ko+GWpgmoCuWefXZV+s:5nXbp34aAMkO0fvyjBAo+GIgmotfXp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2320 f7e91871b8b95a333b4663a348bedeb0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 f7e91871b8b95a333b4663a348bedeb0N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 632 3884 WerFault.exe 83 4040 2320 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7e91871b8b95a333b4663a348bedeb0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3884 f7e91871b8b95a333b4663a348bedeb0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2320 f7e91871b8b95a333b4663a348bedeb0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3884 wrote to memory of 2320 3884 f7e91871b8b95a333b4663a348bedeb0N.exe 91 PID 3884 wrote to memory of 2320 3884 f7e91871b8b95a333b4663a348bedeb0N.exe 91 PID 3884 wrote to memory of 2320 3884 f7e91871b8b95a333b4663a348bedeb0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7e91871b8b95a333b4663a348bedeb0N.exe"C:\Users\Admin\AppData\Local\Temp\f7e91871b8b95a333b4663a348bedeb0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 3962⤵
- Program crash
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\f7e91871b8b95a333b4663a348bedeb0N.exeC:\Users\Admin\AppData\Local\Temp\f7e91871b8b95a333b4663a348bedeb0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 3643⤵
- Program crash
PID:4040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3884 -ip 38841⤵PID:2340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2320 -ip 23201⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD571a5524258fe8c6b9f07014657db845d
SHA1d2a7f41172e4c902f657034854fbf9378a19396a
SHA2560e836a9122dff830ba9c71f18ee69e75f61c85cc7e5d302ee296decc7eed80c0
SHA512e6630ca506912ae6309ed803b99ba086fb5526dc18d5173d6ac70d849ac60da7b9ce014172a0f5ff37407632bcfbe135e6d80031a2e20bb37cf9661e6628e535