Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 02:02

General

  • Target

    655af4de0214b3c21f770308ed792c90N.exe

  • Size

    816KB

  • MD5

    655af4de0214b3c21f770308ed792c90

  • SHA1

    abc3ebf51169545ab16489b72b0d09f34f2520a2

  • SHA256

    85491f5df585cac7a92a750c1ac53fe263cd99c7ef92d85ce120779b38165d03

  • SHA512

    b2264340b786a3854ef25d438e86b3eebabc3d5ac0d893701940ac9650ab4766afd9b25ba404110bd74549d90740446127193922d080a39041637e02275c2abb

  • SSDEEP

    12288:kL1XAhaE5WU98RI5yl48pArv8o4HBTVGZJARmn6eqYrKm9RTq:k5XM3cUy9rY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\655af4de0214b3c21f770308ed792c90N.exe
    "C:\Users\Admin\AppData\Local\Temp\655af4de0214b3c21f770308ed792c90N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 396
      2⤵
      • Program crash
      PID:4172
    • C:\Users\Admin\AppData\Local\Temp\655af4de0214b3c21f770308ed792c90N.exe
      C:\Users\Admin\AppData\Local\Temp\655af4de0214b3c21f770308ed792c90N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4872
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 364
        3⤵
        • Program crash
        PID:212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4588 -ip 4588
    1⤵
      PID:3172
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4872 -ip 4872
      1⤵
        PID:224

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\655af4de0214b3c21f770308ed792c90N.exe

        Filesize

        816KB

        MD5

        78c8ee1a77ed8fa21232ce03dca48247

        SHA1

        3f2201fa00516cfc3d9f0fda992500f4934cdc32

        SHA256

        2c8c5bfc8635ab05ec20dea41ccf329c7bcd9241c59d6325c7c9e2c8b6536db9

        SHA512

        a7438b48e7db2e908d2fe9abdf50db114ba0f0a006fc362a88aa12dc00fd585aa458f9ac53d15a22a556dc0cb72c5fef723664ccbdac6cfee35a13d16bff4d08

      • memory/4588-0-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4588-7-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4872-8-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4872-9-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/4872-14-0x0000000003D50000-0x0000000003D88000-memory.dmp

        Filesize

        224KB

      • memory/4872-15-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB