Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
b9dfaa7eddb5c3f51920e846f76a8710N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9dfaa7eddb5c3f51920e846f76a8710N.exe
Resource
win10v2004-20240802-en
General
-
Target
b9dfaa7eddb5c3f51920e846f76a8710N.exe
-
Size
3.2MB
-
MD5
b9dfaa7eddb5c3f51920e846f76a8710
-
SHA1
60bc96033828e94413bd6e367b0f7a67000b71f9
-
SHA256
a1981cc694e2616c831703946f3b50decf1bbc063d1a03808cd9ba6686f8d3e4
-
SHA512
7cae6868ca69d376ad636150e4a60d743e099fd544e7ffab49df737787045a33657fdc43434edc488507d7fde77034112da0352617def1f054129ba37e9263e8
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Nv:DBIKRAGRe5K2UZj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5116 e57852e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4272 5116 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9dfaa7eddb5c3f51920e846f76a8710N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e57852e.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2000 b9dfaa7eddb5c3f51920e846f76a8710N.exe 2000 b9dfaa7eddb5c3f51920e846f76a8710N.exe 5116 e57852e.exe 5116 e57852e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 5116 2000 b9dfaa7eddb5c3f51920e846f76a8710N.exe 84 PID 2000 wrote to memory of 5116 2000 b9dfaa7eddb5c3f51920e846f76a8710N.exe 84 PID 2000 wrote to memory of 5116 2000 b9dfaa7eddb5c3f51920e846f76a8710N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9dfaa7eddb5c3f51920e846f76a8710N.exe"C:\Users\Admin\AppData\Local\Temp\b9dfaa7eddb5c3f51920e846f76a8710N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57852e.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57852e.exe 2406167652⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 18883⤵
- Program crash
PID:4272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5116 -ip 51161⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD56ee2b5b9d895c17e27913867434718ba
SHA158201ef3ed4a4482762f39879ac9da214ca9fac6
SHA25631cd1a07f34e29e203655db805157a1f64fc6cbfc48b9bbb4f0507e9434348e2
SHA512e8b14e50fbc594534ff62de630eeec1d40e48870f4394d84a354ddc494d7e2733bb51551ec1dd38eba429871d8a056c5e68eed1c75671e0835edd05d80dde72d