Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
44d8e99d2d87b8400588b58f370d59f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44d8e99d2d87b8400588b58f370d59f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
44d8e99d2d87b8400588b58f370d59f0N.exe
-
Size
220KB
-
MD5
44d8e99d2d87b8400588b58f370d59f0
-
SHA1
9791947e3a6171b65c4bf3327cd135895a19d5a8
-
SHA256
1db87e480bd4bfdf3fa5e856972f85b2fd8fc688cd3a0c146041016e4e83e7e5
-
SHA512
3bc3b15f0a09c55a8447f3ab8714c2dd0b05caf8419985605caaa468d6eb1c65d0d2fb5fe1607785bb5b72cdf6bf6bec96477c6cb6ff1434ef65f11a7bbcb307
-
SSDEEP
3072:w18Gs+C11XB4TqtTEI506wcIYKFbJaDMKvi8OLa3eSUzJI1s4t2TxKPC9KBpql+m:w1jMrqwTyBYEqNOKeLNI1Rt2sPC9KrVC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2180 44d8e99d2d87b8400588b58f370d59f0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 44d8e99d2d87b8400588b58f370d59f0N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3472 1360 WerFault.exe 83 4924 2180 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44d8e99d2d87b8400588b58f370d59f0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1360 44d8e99d2d87b8400588b58f370d59f0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2180 44d8e99d2d87b8400588b58f370d59f0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2180 1360 44d8e99d2d87b8400588b58f370d59f0N.exe 91 PID 1360 wrote to memory of 2180 1360 44d8e99d2d87b8400588b58f370d59f0N.exe 91 PID 1360 wrote to memory of 2180 1360 44d8e99d2d87b8400588b58f370d59f0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d8e99d2d87b8400588b58f370d59f0N.exe"C:\Users\Admin\AppData\Local\Temp\44d8e99d2d87b8400588b58f370d59f0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 3962⤵
- Program crash
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\44d8e99d2d87b8400588b58f370d59f0N.exeC:\Users\Admin\AppData\Local\Temp\44d8e99d2d87b8400588b58f370d59f0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 3643⤵
- Program crash
PID:4924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1360 -ip 13601⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2180 -ip 21801⤵PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD55d397a7a51f157446351f17953d0c7c6
SHA1c4ba53aa519a8cc16cf43b425161a6a2c4a4b1d1
SHA2560f65345290edaaf3152fe075c7d41823a8a1984191eaa6c7350b42e7692e6583
SHA51270eb7c45f66453bbfa180378dfd5cca0e4e684b7c2244431cf5ff66e53ad0093333113c904537f2fd68c765cff231a361392917ec98d7b85dea3a2b3df48d9ee