Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
2aac8d6e707cada89d6ce7aef65d2170N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2aac8d6e707cada89d6ce7aef65d2170N.exe
Resource
win10v2004-20240802-en
General
-
Target
2aac8d6e707cada89d6ce7aef65d2170N.exe
-
Size
668KB
-
MD5
2aac8d6e707cada89d6ce7aef65d2170
-
SHA1
0123631fe0642354659d448d53509b503b9c87c3
-
SHA256
5e7610b4046b3c716fd91db949232cd7127ba3f03f27b2e175e6754acfd61d4b
-
SHA512
053add31069f078c8f7f076a3ea660bc3bfd3d065946811fbaf3106885b1a022ff6948bd0f40a127b17039a5097df16008407ac9315b509651ba8890c33a339c
-
SSDEEP
12288:JbZ1hLgoGURlJDHUVQ5zCN2j6FB5WMlL143VQ5zCSjdgEi0kXz:1hLg38lJDHUVQ5zg2mblLO3VQ5zxjdgx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 736 2aac8d6e707cada89d6ce7aef65d2170N.exe -
Executes dropped EXE 1 IoCs
pid Process 736 2aac8d6e707cada89d6ce7aef65d2170N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4000 4108 WerFault.exe 83 912 736 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aac8d6e707cada89d6ce7aef65d2170N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4108 2aac8d6e707cada89d6ce7aef65d2170N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 736 2aac8d6e707cada89d6ce7aef65d2170N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4108 wrote to memory of 736 4108 2aac8d6e707cada89d6ce7aef65d2170N.exe 91 PID 4108 wrote to memory of 736 4108 2aac8d6e707cada89d6ce7aef65d2170N.exe 91 PID 4108 wrote to memory of 736 4108 2aac8d6e707cada89d6ce7aef65d2170N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exe"C:\Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 4002⤵
- Program crash
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exeC:\Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 3643⤵
- Program crash
PID:912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4108 -ip 41081⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 736 -ip 7361⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
668KB
MD5bc1ff35c85f7e3ddecd95a6e5d4d1aaa
SHA1b17555023abc65ae452a9a787dabaa36e2026686
SHA256bc9ad73bd4ce103e8007cd46af09e1f4c2fe69b63384ccfca4210059a75afb24
SHA512dc1307a0951fd69752b78d9773d78210d5d5e49b746dd7ae68488fe4d48ef3357a33a138c76cf6c5f3fd760478d6aedb20af9b2c986fb55d2989e1889b080af8