Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
04c8e6deadc432af6c7f2f4c51e0c040N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04c8e6deadc432af6c7f2f4c51e0c040N.exe
Resource
win10v2004-20240802-en
General
-
Target
04c8e6deadc432af6c7f2f4c51e0c040N.exe
-
Size
384KB
-
MD5
04c8e6deadc432af6c7f2f4c51e0c040
-
SHA1
b4d1228f8f13617be013ffc9d5f53f936a60ccd3
-
SHA256
4e4cb96979c181e754c05dea487715342a4d7037b24c08e6cc9e92fffc42093d
-
SHA512
3b9592b2db7e1bfc8dac13e01ec6b7b369f18a0c1e9cf451034af9ec8a5eca6b41be47cbf57cae829a43e781a0fb0c125b68e062381a6e77f6f34b079d2f0055
-
SSDEEP
6144:MpujUeJJJrqu548zK6+sZGXp7Ve52SWhV40saiigCD4H2cS:McjUs9548zbTyp7g52SWhVQ5zCD4TS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1516 04c8e6deadc432af6c7f2f4c51e0c040N.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 04c8e6deadc432af6c7f2f4c51e0c040N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3436 4048 WerFault.exe 90 1036 1516 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04c8e6deadc432af6c7f2f4c51e0c040N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4048 04c8e6deadc432af6c7f2f4c51e0c040N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1516 04c8e6deadc432af6c7f2f4c51e0c040N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1516 4048 04c8e6deadc432af6c7f2f4c51e0c040N.exe 98 PID 4048 wrote to memory of 1516 4048 04c8e6deadc432af6c7f2f4c51e0c040N.exe 98 PID 4048 wrote to memory of 1516 4048 04c8e6deadc432af6c7f2f4c51e0c040N.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\04c8e6deadc432af6c7f2f4c51e0c040N.exe"C:\Users\Admin\AppData\Local\Temp\04c8e6deadc432af6c7f2f4c51e0c040N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 3962⤵
- Program crash
PID:3436
-
-
C:\Users\Admin\AppData\Local\Temp\04c8e6deadc432af6c7f2f4c51e0c040N.exeC:\Users\Admin\AppData\Local\Temp\04c8e6deadc432af6c7f2f4c51e0c040N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 3643⤵
- Program crash
PID:1036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4048 -ip 40481⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1516 -ip 15161⤵PID:1184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3960,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=4208 /prefetch:81⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5df26810b91a8b8841da19a6465e1258f
SHA1ca1d322231a73bfc91be8b9600c80676870f190c
SHA2562fb2c0c5e5ff8bdc35898f671e1898b93056f9d31a86450ba2ade236c8a0d36e
SHA512da46277475c1a050dd5b4b0e0de829e1a48d9e9adf95ecccd45390556af0fc9a3a0d6307ce853d39bda6572f41bdada39c10e51e1c7f3fcb97744155f522581c