Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
4722dd6ceff105a579d67e63f5402660N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4722dd6ceff105a579d67e63f5402660N.exe
Resource
win10v2004-20240802-en
General
-
Target
4722dd6ceff105a579d67e63f5402660N.exe
-
Size
256KB
-
MD5
4722dd6ceff105a579d67e63f5402660
-
SHA1
b92f8c72ef084be7cca1328d2a09cb2200a0c3e1
-
SHA256
6b47be6b825c54b9d01b3a283b96a752df3cd26ee856d3971911153902925fbd
-
SHA512
69585e8924fb9bd29e6a275d1afd368865a36dfb6acfc8f09b1532fba3aa5d31b895037cac99bdd88b096535f6b2107e3bba9efa578c4ebc16ee9ce6aebb3568
-
SSDEEP
6144:DcHDq7bXdhavxdjUccBucIgQfieWdDJboY4sJ8:DcHOLYxFUZRI9fie6D9d8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3828 4722dd6ceff105a579d67e63f5402660N.exe -
Executes dropped EXE 1 IoCs
pid Process 3828 4722dd6ceff105a579d67e63f5402660N.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 2876 2024 WerFault.exe 83 4168 3828 WerFault.exe 90 2688 3828 WerFault.exe 90 1032 3828 WerFault.exe 90 396 3828 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4722dd6ceff105a579d67e63f5402660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4722dd6ceff105a579d67e63f5402660N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2024 4722dd6ceff105a579d67e63f5402660N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3828 4722dd6ceff105a579d67e63f5402660N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3828 2024 4722dd6ceff105a579d67e63f5402660N.exe 90 PID 2024 wrote to memory of 3828 2024 4722dd6ceff105a579d67e63f5402660N.exe 90 PID 2024 wrote to memory of 3828 2024 4722dd6ceff105a579d67e63f5402660N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4722dd6ceff105a579d67e63f5402660N.exe"C:\Users\Admin\AppData\Local\Temp\4722dd6ceff105a579d67e63f5402660N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 3842⤵
- Program crash
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\4722dd6ceff105a579d67e63f5402660N.exeC:\Users\Admin\AppData\Local\Temp\4722dd6ceff105a579d67e63f5402660N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 3523⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 7723⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 8083⤵
- Program crash
PID:1032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 7763⤵
- Program crash
PID:396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2024 -ip 20241⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3828 -ip 38281⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3828 -ip 38281⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3828 -ip 38281⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3828 -ip 38281⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5aef7967c102241ce7269525f6d5706a0
SHA1d79219a6c153b57ca650aa36caf48b403cf3ca9d
SHA256144c73d1d4928122444514b95a3da936723c27ccf05ca65672aacf0d7ef382f1
SHA512a639557da6e8e468afa73390d2f7ecb630043e587d422efac7a1d5502baf148af02cd146c8db1dfa107123ba724054461260ef6a28178835c34adadfe92c5016