Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
014776957e0963024c62982d9edf4eb0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
014776957e0963024c62982d9edf4eb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
014776957e0963024c62982d9edf4eb0N.exe
-
Size
320KB
-
MD5
014776957e0963024c62982d9edf4eb0
-
SHA1
d4f5a81109b26f96d72f160ddb557cab9a7f84a8
-
SHA256
fc36cd269e375991220e5e06a4d20a60e5240fbd543dace5dedd823d8ff0356a
-
SHA512
41dbf9a3a64b7ed00f0c038ccb8d709ff4e39c84301f4b38fef8b76eb3b6f27894de281ba483d528c4b9c3ed26e1bbd3a8e0672fe11fdc44ff1906d6d685db61
-
SSDEEP
6144:VY7e9uuZExOri72+Y7jCnnq9vmqYWr6xVGym1Bk53BDu0W7cyqCxSngmMBqfycuq:VWu2x0i72+Y70Emw6xVPmA53p80npM4/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4720 014776957e0963024c62982d9edf4eb0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4720 014776957e0963024c62982d9edf4eb0N.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2216 2404 WerFault.exe 82 4800 4720 WerFault.exe 89 2260 4720 WerFault.exe 89 4568 4720 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 014776957e0963024c62982d9edf4eb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 014776957e0963024c62982d9edf4eb0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2404 014776957e0963024c62982d9edf4eb0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4720 014776957e0963024c62982d9edf4eb0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2404 wrote to memory of 4720 2404 014776957e0963024c62982d9edf4eb0N.exe 89 PID 2404 wrote to memory of 4720 2404 014776957e0963024c62982d9edf4eb0N.exe 89 PID 2404 wrote to memory of 4720 2404 014776957e0963024c62982d9edf4eb0N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe"C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 3842⤵
- Program crash
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exeC:\Users\Admin\AppData\Local\Temp\014776957e0963024c62982d9edf4eb0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 3523⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 7763⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 7963⤵
- Program crash
PID:4568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2404 -ip 24041⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4720 -ip 47201⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4720 -ip 47201⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4720 -ip 47201⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5e2d0a2e337fc18b3843f743dcbef05f2
SHA1b11d11ecc5747aeb9b60af57a30318b97674d978
SHA2564245440e8d2db9af09907d832b1af694ebe4fe3552d785f8e579e7d50e77d2ce
SHA5128ee8fb82efc5c4a2919e9fe9c3642b80b98f2a775a1bb1ed3eca4c11b14b267c64d56efd9a86ce50785b9230bd9095f4ae118a8415f7f117e7617f0ca4ca0423