Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
f64beadb2e68d3c52a8660ed734ee170N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f64beadb2e68d3c52a8660ed734ee170N.exe
Resource
win10v2004-20240802-en
General
-
Target
f64beadb2e68d3c52a8660ed734ee170N.exe
-
Size
231KB
-
MD5
f64beadb2e68d3c52a8660ed734ee170
-
SHA1
138cc8559ede7c70fc2c1c15a97f724b6ffebe2c
-
SHA256
9b3d37851c46684e6bf14a73eb7bbd87354483e5434ff8c5c62e4f7cfea21572
-
SHA512
be19cb158b7cdfeac57c6490cba849ff4b51eba4206f1a8d6bbef84e74882a959c1370a3ce1a01b3d9a4efbca09288446e58411fe140ccf90d1e06da35d81144
-
SSDEEP
6144:uW3I12xMq0tbTSupm1iccN3CeB4TS6s1dbbmJpslZcrbNTtfD3s:rCfq0tbTX4ipSa4O6s1dbbmJKlmrbNTS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4004 f64beadb2e68d3c52a8660ed734ee170N.exe -
Executes dropped EXE 1 IoCs
pid Process 4004 f64beadb2e68d3c52a8660ed734ee170N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3308 2424 WerFault.exe 83 3236 4004 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f64beadb2e68d3c52a8660ed734ee170N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2424 f64beadb2e68d3c52a8660ed734ee170N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4004 f64beadb2e68d3c52a8660ed734ee170N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2424 wrote to memory of 4004 2424 f64beadb2e68d3c52a8660ed734ee170N.exe 91 PID 2424 wrote to memory of 4004 2424 f64beadb2e68d3c52a8660ed734ee170N.exe 91 PID 2424 wrote to memory of 4004 2424 f64beadb2e68d3c52a8660ed734ee170N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exe"C:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 3842⤵
- Program crash
PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exeC:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 3523⤵
- Program crash
PID:3236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2424 -ip 24241⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4004 -ip 40041⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5cc8036a7bbcdf82580c4a116dd614fe1
SHA16393ae2b89e165586caa72c6ad349bb477d61029
SHA256fa31770ee56ce93218951a42ac4d599b6f2138322378bf5d2aef775906cbb20f
SHA51211f7582ebc7055de8007f274a6db61374962482724c7756a7ca3c788af503772c68932a2cfc787ba87a73e83cbb3eb99a45e645d435756cbaf48095bebb3c7ac