Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
d20414c0807a9d368b457d2e35e5fb00N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d20414c0807a9d368b457d2e35e5fb00N.exe
Resource
win10v2004-20240802-en
General
-
Target
d20414c0807a9d368b457d2e35e5fb00N.exe
-
Size
453KB
-
MD5
d20414c0807a9d368b457d2e35e5fb00
-
SHA1
c98f146b3d5737ed81d5a1969c8600e8d1fdf26f
-
SHA256
7a46d837a1b8c92d9d5193a13bb8952edecf331fc0bcb0f2df9946cccabd7f3d
-
SHA512
2c6e60b87fb0ed25db28a63cbf4fa27d5e32b7bfd7c21a4d5895114f00a757d92c14df9eb24d51e15d792757a8646c426ff16ec500531316f26fd22a8a81d024
-
SSDEEP
6144:HZAxR5EDPW+QJXkMlvls8W+9gN3sZ20W7cyqCxSngmMBqfycuPbUl0i5cD5J6b8M:H7P8JTtAxN3gk0npM4dl0v5JHpS0wULW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2152 d20414c0807a9d368b457d2e35e5fb00N.exe -
Executes dropped EXE 1 IoCs
pid Process 2152 d20414c0807a9d368b457d2e35e5fb00N.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 4704 3904 WerFault.exe 85 3092 2152 WerFault.exe 92 3484 2152 WerFault.exe 92 2868 2152 WerFault.exe 92 864 2152 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d20414c0807a9d368b457d2e35e5fb00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d20414c0807a9d368b457d2e35e5fb00N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3904 d20414c0807a9d368b457d2e35e5fb00N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2152 d20414c0807a9d368b457d2e35e5fb00N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3904 wrote to memory of 2152 3904 d20414c0807a9d368b457d2e35e5fb00N.exe 92 PID 3904 wrote to memory of 2152 3904 d20414c0807a9d368b457d2e35e5fb00N.exe 92 PID 3904 wrote to memory of 2152 3904 d20414c0807a9d368b457d2e35e5fb00N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d20414c0807a9d368b457d2e35e5fb00N.exe"C:\Users\Admin\AppData\Local\Temp\d20414c0807a9d368b457d2e35e5fb00N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 3842⤵
- Program crash
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\d20414c0807a9d368b457d2e35e5fb00N.exeC:\Users\Admin\AppData\Local\Temp\d20414c0807a9d368b457d2e35e5fb00N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 3523⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 7683⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 7723⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 8043⤵
- Program crash
PID:864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3904 -ip 39041⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2152 -ip 21521⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2152 -ip 21521⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2152 -ip 21521⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2152 -ip 21521⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
453KB
MD51b12c22f0182f77674ace4cfbe5923bc
SHA168543da7bb203c86cc5b0098820d840cdf96a9d5
SHA2568542ea98f2a7c94e259a9c310d1451cd33d471336b1b428afd58b184d683d747
SHA5121eb3bd812a6b63a49b21cd55d64603eae9bc7291b2a7d08697768e3a766fd2e8d1c7b34f81976684b02805c8a10ad8afcd5ddff85ff4a8c9978f08c01bf0d5ca