Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
5f967342f670b09f2e0c107e150f43e0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5f967342f670b09f2e0c107e150f43e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5f967342f670b09f2e0c107e150f43e0N.exe
-
Size
256KB
-
MD5
5f967342f670b09f2e0c107e150f43e0
-
SHA1
10f25240f52807eb848fddd965f1d621184fc60b
-
SHA256
fb92e5dedbcab6e5dde64a240a27b26a550be75f702cc387d8861d0d60f462ab
-
SHA512
4eb1bb70ab708545f3321bd1f41bfaf56b08121d3a691883183479923d372fee6784584c37886c8ee0b7bd2accd10a488867c0ace4f709e19ed2aeb73eed62a4
-
SSDEEP
6144:Z2vfy7/4/pSgCi7nK6Uka79H0W7cyqCxSng7:ZYy7YSgp707j0nk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4184 5f967342f670b09f2e0c107e150f43e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4184 5f967342f670b09f2e0c107e150f43e0N.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 3100 4796 WerFault.exe 83 4068 4184 WerFault.exe 90 3024 4184 WerFault.exe 90 916 4184 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f967342f670b09f2e0c107e150f43e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f967342f670b09f2e0c107e150f43e0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4796 5f967342f670b09f2e0c107e150f43e0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4184 5f967342f670b09f2e0c107e150f43e0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4184 4796 5f967342f670b09f2e0c107e150f43e0N.exe 90 PID 4796 wrote to memory of 4184 4796 5f967342f670b09f2e0c107e150f43e0N.exe 90 PID 4796 wrote to memory of 4184 4796 5f967342f670b09f2e0c107e150f43e0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe"C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 3842⤵
- Program crash
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exeC:\Users\Admin\AppData\Local\Temp\5f967342f670b09f2e0c107e150f43e0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 3603⤵
- Program crash
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 7723⤵
- Program crash
PID:3024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 7923⤵
- Program crash
PID:916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4796 -ip 47961⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4184 -ip 41841⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4184 -ip 41841⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4184 -ip 41841⤵PID:3380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD52552df65b441fd04b3adbccee6418fbc
SHA102062629bc6c37e57f15b181919fd2d3b8c9d333
SHA25636f8e5ff41d7c3edf6c5e794f6738c9b28f22c795f9e0dedf6b4fe429792139b
SHA51216430233103d6d79973769b1fcff9bacd2cbc5cc56832ee8b47e7eaba893dac5372a626e735122320544f4c2c5bbe0a56ae0138f4002456b3730c036b26ab634