Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
71715bd5a7b3e0f205a48191c6e96c30N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
71715bd5a7b3e0f205a48191c6e96c30N.exe
Resource
win10v2004-20240802-en
General
-
Target
71715bd5a7b3e0f205a48191c6e96c30N.exe
-
Size
1.3MB
-
MD5
71715bd5a7b3e0f205a48191c6e96c30
-
SHA1
546e19172691ca8e6a0105b00e636a6280e6a5b4
-
SHA256
bcf6163f18f622abb0d947a6f168fd9c9365a0c48a91969f2cc60c7d3e3c23e5
-
SHA512
579bf8d135d68169d7e89116b43714345d175075b1fb56bf08737d3ce0237cdc0eb85faaad1d8be54bc696112340af79b63cc26d596309f52483f45baaf2f5f4
-
SSDEEP
24576:D88nWu4F9ISOa7NqiswdtGZWUUW59QiXza/ZSjXuF77Lv+f6T8Qnskb2i6OBKaBp:Db0ZJ+ZHqKgGXuFbq4TT+E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2032 71715bd5a7b3e0f205a48191c6e96c30N.exe -
Executes dropped EXE 1 IoCs
pid Process 2032 71715bd5a7b3e0f205a48191c6e96c30N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 pastebin.com 21 pastebin.com -
Program crash 15 IoCs
pid pid_target Process procid_target 3376 4612 WerFault.exe 82 1532 2032 WerFault.exe 90 3276 2032 WerFault.exe 90 1448 2032 WerFault.exe 90 400 2032 WerFault.exe 90 4192 2032 WerFault.exe 90 3872 2032 WerFault.exe 90 2632 2032 WerFault.exe 90 1400 2032 WerFault.exe 90 3444 2032 WerFault.exe 90 4480 2032 WerFault.exe 90 4000 2032 WerFault.exe 90 4500 2032 WerFault.exe 90 3940 2032 WerFault.exe 90 4732 2032 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71715bd5a7b3e0f205a48191c6e96c30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71715bd5a7b3e0f205a48191c6e96c30N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2032 71715bd5a7b3e0f205a48191c6e96c30N.exe 2032 71715bd5a7b3e0f205a48191c6e96c30N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4612 71715bd5a7b3e0f205a48191c6e96c30N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2032 71715bd5a7b3e0f205a48191c6e96c30N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2032 4612 71715bd5a7b3e0f205a48191c6e96c30N.exe 90 PID 4612 wrote to memory of 2032 4612 71715bd5a7b3e0f205a48191c6e96c30N.exe 90 PID 4612 wrote to memory of 2032 4612 71715bd5a7b3e0f205a48191c6e96c30N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\71715bd5a7b3e0f205a48191c6e96c30N.exe"C:\Users\Admin\AppData\Local\Temp\71715bd5a7b3e0f205a48191c6e96c30N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 3442⤵
- Program crash
PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\71715bd5a7b3e0f205a48191c6e96c30N.exeC:\Users\Admin\AppData\Local\Temp\71715bd5a7b3e0f205a48191c6e96c30N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 3443⤵
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6283⤵
- Program crash
PID:3276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6683⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6283⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 7203⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 9603⤵
- Program crash
PID:3872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 14083⤵
- Program crash
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 14643⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 14803⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 14683⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 14323⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 14923⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 17323⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 15163⤵
- Program crash
PID:4732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4612 -ip 46121⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2032 -ip 20321⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2032 -ip 20321⤵PID:884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2032 -ip 20321⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2032 -ip 20321⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2032 -ip 20321⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2032 -ip 20321⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2032 -ip 20321⤵PID:968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2032 -ip 20321⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2032 -ip 20321⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2032 -ip 20321⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2032 -ip 20321⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2032 -ip 20321⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2032 -ip 20321⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2032 -ip 20321⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5fb9d21c7630d42c3351c5ba3dd20077c
SHA192698e9b24cf7d65b19f2b047d5b6af58e49a9c7
SHA256223dbbd62b35c712ccff2f518376d16970e6b4982e6605885e59d0ec5626da90
SHA5122c8126f08e9453438d5a862ba6cfac4ba719cd32252b5ecdee1269e33661d4779de5b71947ec0b7b309775c5bd8499e71ec9a76bb9ba77e359826788227b8907