Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    104s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 20:54

General

  • Target

    a9e4ef6504c168c3834bb554ddbaf8f0N.exe

  • Size

    372KB

  • MD5

    a9e4ef6504c168c3834bb554ddbaf8f0

  • SHA1

    57047ef52fa004baa8d4245311c3212a2ffd0964

  • SHA256

    fbf826265e7f0a4d6b3db01f4ff96b30183e93bab1d6226df01b1becdddf70eb

  • SHA512

    14aaf09d234e2bba07330b4a700ee9b7dc4facf616dccf4390f574dfcd06949b1aec12d45e9c7ae8718d1512250d9589e5ee58e4c755816aebcdb21807126c6a

  • SSDEEP

    6144:BkLYyvZFsjpHQvXrlHyJzVJot3aERiLTwEYYs1Z:BkLYyourOWaE0TGY

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9e4ef6504c168c3834bb554ddbaf8f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a9e4ef6504c168c3834bb554ddbaf8f0N.exe"
    1⤵
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\SysWOW64\sysctl.exe
      C:\Windows\system32\sysctl.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 456
        3⤵
        • Program crash
        PID:4328
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 488
      2⤵
      • Program crash
      PID:3192
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 860 -ip 860
    1⤵
      PID:1268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 872 -ip 872
      1⤵
        PID:4448

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\sysctl.exe

        Filesize

        372KB

        MD5

        e9d218ac2e7fd2f8d174593912e9b947

        SHA1

        414c9cac07d194974695033a88c45a4bb471c38e

        SHA256

        fc36580b94165d884434f4a94e59ce46635a269a521016a7e002fa3f8c95b758

        SHA512

        6283eaa280f6d64098eed6067346f68862ce3c269041a0dc344bf86a51a041a93b678b4e9eac3a53122ecd40652e2e8a5d09012cdf8ae77bfe0771b93de0562d

      • memory/860-6-0x00000000007F0000-0x00000000007F1000-memory.dmp

        Filesize

        4KB

      • memory/860-8-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB

      • memory/872-0-0x0000000000590000-0x0000000000591000-memory.dmp

        Filesize

        4KB

      • memory/872-7-0x0000000000400000-0x0000000000451000-memory.dmp

        Filesize

        324KB