Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
deb0299f10c1c5bc231249190e559300N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
deb0299f10c1c5bc231249190e559300N.exe
Resource
win10v2004-20240802-en
General
-
Target
deb0299f10c1c5bc231249190e559300N.exe
-
Size
2.3MB
-
MD5
deb0299f10c1c5bc231249190e559300
-
SHA1
83db4e7bfd398e9e778742a4cf98cb565e7b16e1
-
SHA256
01001674575a869cbeb9a9063aae82184d1621b49a34a4435600c6987ff104a0
-
SHA512
51bb77547f35b7f29934f3611e6f0dcccdff1999eced39a42188653de507b20aebff99269c21045057c0f5e9023b90860603573637bad1f43865fc5fe15a419f
-
SSDEEP
24576:6mrMjCIi2GVa/ZSkJovBYLYsSwdaJ+4h99Fm+ci2a/ZSrJovBY:6mraig+h7Q+F2g
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 556 deb0299f10c1c5bc231249190e559300N.exe -
Executes dropped EXE 1 IoCs
pid Process 556 deb0299f10c1c5bc231249190e559300N.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3092 4760 WerFault.exe 85 1804 556 WerFault.exe 93 2432 556 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deb0299f10c1c5bc231249190e559300N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4760 deb0299f10c1c5bc231249190e559300N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 556 deb0299f10c1c5bc231249190e559300N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4760 wrote to memory of 556 4760 deb0299f10c1c5bc231249190e559300N.exe 93 PID 4760 wrote to memory of 556 4760 deb0299f10c1c5bc231249190e559300N.exe 93 PID 4760 wrote to memory of 556 4760 deb0299f10c1c5bc231249190e559300N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\deb0299f10c1c5bc231249190e559300N.exe"C:\Users\Admin\AppData\Local\Temp\deb0299f10c1c5bc231249190e559300N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 3442⤵
- Program crash
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\deb0299f10c1c5bc231249190e559300N.exeC:\Users\Admin\AppData\Local\Temp\deb0299f10c1c5bc231249190e559300N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 3443⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 3803⤵
- Program crash
PID:2432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4760 -ip 47601⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 556 -ip 5561⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 556 -ip 5561⤵PID:3864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD51faf637163397a940780d56382315d4d
SHA1b2245c02a1a52113747357575c335ab824e060f5
SHA256cfa69c5c40ddca6bf454ff3ea047768859d6b78e519c3a5868df4863115fd906
SHA5127ca4b2f1ccce0b65b07380a0c6e03a067be6a7bad26b5b84cd0a45f2d92b821a6d25b3fcafff6153472178ec796c285798092b41d2a815ffce27b17409b85776