Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
865942212e4309391a5f173300970b90N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
865942212e4309391a5f173300970b90N.exe
Resource
win10v2004-20240802-en
General
-
Target
865942212e4309391a5f173300970b90N.exe
-
Size
128KB
-
MD5
865942212e4309391a5f173300970b90
-
SHA1
ddf017a9fdd15b8d164ac7090b2f4d865314707e
-
SHA256
986519b24e3f923a848367aca0a8190c023ae238ee4b222958bc93c8155bd30c
-
SHA512
fba38a6d54aef9383f3a7c83d7386b477b37c792b981a1ec848791d735998aa4ca03adf59a0255b2a8a808917b95b4a58c07cfe4e314b814b244d4d7c8630fb0
-
SSDEEP
3072:2eimpdqKIaczJilZWLQbj+FiAbwf1nFzwSAJB8g:xvq5slZyAOQ1n6xJmg
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 865942212e4309391a5f173300970b90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 865942212e4309391a5f173300970b90N.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 Diqnjl32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Qahlom32.dll 865942212e4309391a5f173300970b90N.exe File created C:\Windows\SysWOW64\Diqnjl32.exe 865942212e4309391a5f173300970b90N.exe File opened for modification C:\Windows\SysWOW64\Diqnjl32.exe 865942212e4309391a5f173300970b90N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3388 2108 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 865942212e4309391a5f173300970b90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Diqnjl32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 865942212e4309391a5f173300970b90N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 865942212e4309391a5f173300970b90N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 865942212e4309391a5f173300970b90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qahlom32.dll" 865942212e4309391a5f173300970b90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 865942212e4309391a5f173300970b90N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 865942212e4309391a5f173300970b90N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2108 2688 865942212e4309391a5f173300970b90N.exe 88 PID 2688 wrote to memory of 2108 2688 865942212e4309391a5f173300970b90N.exe 88 PID 2688 wrote to memory of 2108 2688 865942212e4309391a5f173300970b90N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\865942212e4309391a5f173300970b90N.exe"C:\Users\Admin\AppData\Local\Temp\865942212e4309391a5f173300970b90N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Diqnjl32.exeC:\Windows\system32\Diqnjl32.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 4123⤵
- Program crash
PID:3388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2108 -ip 21081⤵PID:2052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3780 /prefetch:81⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD569e9b39d7859a55b12ccde201c1aa779
SHA12081abca56e75883ec21e27edc0e8c628c5a8920
SHA256e8c0c694036d30aee31424c2e9cf8ab99e11381b7687e99f2462d90ff5eee43a
SHA512af62cfe3b3d8e6bb1a64ae44f3c915012566f7d6d5d74e6ae99c61e8baf747c36537ecc59a5d42f5d17fb2508e071ef3da46d422d4e1906befad7a2150915f67