Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    104s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 08:24

General

  • Target

    5f967342f670b09f2e0c107e150f43e0N.exe

  • Size

    256KB

  • MD5

    5f967342f670b09f2e0c107e150f43e0

  • SHA1

    10f25240f52807eb848fddd965f1d621184fc60b

  • SHA256

    fb92e5dedbcab6e5dde64a240a27b26a550be75f702cc387d8861d0d60f462ab

  • SHA512

    4eb1bb70ab708545f3321bd1f41bfaf56b08121d3a691883183479923d372fee6784584c37886c8ee0b7bd2accd10a488867c0ace4f709e19ed2aeb73eed62a4

  • SSDEEP

    6144:Z2vfy7/4/pSgCi7nK6Uka79H0W7cyqCxSng7:ZYy7YSgp707j0nk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 384
      2⤵
      • Program crash
      PID:3100
    • C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe
      C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:4184
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 360
        3⤵
        • Program crash
        PID:4068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 772
        3⤵
        • Program crash
        PID:3024
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 792
        3⤵
        • Program crash
        PID:916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4796 -ip 4796
    1⤵
      PID:4856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4184 -ip 4184
      1⤵
        PID:452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4184 -ip 4184
        1⤵
          PID:4160
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4184 -ip 4184
          1⤵
            PID:3380

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe

            Filesize

            256KB

            MD5

            2552df65b441fd04b3adbccee6418fbc

            SHA1

            02062629bc6c37e57f15b181919fd2d3b8c9d333

            SHA256

            36f8e5ff41d7c3edf6c5e794f6738c9b28f22c795f9e0dedf6b4fe429792139b

            SHA512

            16430233103d6d79973769b1fcff9bacd2cbc5cc56832ee8b47e7eaba893dac5372a626e735122320544f4c2c5bbe0a56ae0138f4002456b3730c036b26ab634

          • memory/4184-6-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/4184-8-0x0000000004DB0000-0x0000000004DF1000-memory.dmp

            Filesize

            260KB

          • memory/4184-9-0x0000000000400000-0x0000000000415000-memory.dmp

            Filesize

            84KB

          • memory/4184-14-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/4796-0-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/4796-7-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB