Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 19:35
Behavioral task
behavioral1
Sample
3ba042d477d1e2e38ffa8fd55cff7010N.exe
Resource
win7-20240903-en
General
-
Target
3ba042d477d1e2e38ffa8fd55cff7010N.exe
-
Size
6.4MB
-
MD5
3ba042d477d1e2e38ffa8fd55cff7010
-
SHA1
fbc009ab82ff3cf9d9e0c0f163df5f02af037ae1
-
SHA256
2c4bce1f47c63db8079ffe9a2f74e186dcd307c713c9e1bab8826f64d8bca66c
-
SHA512
cdcde0f01d7b2c7af8410523b27c7efe00ac7a5341f9aba7d7acf0cda05860dcc99eda5d2a6460b2ed87b691c27dc258d60c396de4cbd0905efeadca6795abbf
-
SSDEEP
196608:fz2dlVkHazkDKWTodlDnOz5dlVkHazkDKWTodlHq7n5dlVkHazkDKWTodlDnOz5K:fzMXeKWeOzDXeKWoqTDXeKWeOzDXeKWn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
Executes dropped EXE 1 IoCs
pid Process 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
resource yara_rule behavioral2/memory/1252-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x0008000000023473-12.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 12 pastebin.com -
Program crash 18 IoCs
pid pid_target Process procid_target 1576 4536 WerFault.exe 88 4284 4536 WerFault.exe 88 1144 4536 WerFault.exe 88 2092 4536 WerFault.exe 88 3828 4536 WerFault.exe 88 2860 4536 WerFault.exe 88 3968 4536 WerFault.exe 88 1348 4536 WerFault.exe 88 2668 4536 WerFault.exe 88 1616 4536 WerFault.exe 88 4404 4536 WerFault.exe 88 3568 4536 WerFault.exe 88 4920 4536 WerFault.exe 88 2644 4536 WerFault.exe 88 4612 4536 WerFault.exe 88 2980 4536 WerFault.exe 88 2328 4536 WerFault.exe 88 4352 4536 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ba042d477d1e2e38ffa8fd55cff7010N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ba042d477d1e2e38ffa8fd55cff7010N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1252 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1252 3ba042d477d1e2e38ffa8fd55cff7010N.exe 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1252 wrote to memory of 4536 1252 3ba042d477d1e2e38ffa8fd55cff7010N.exe 88 PID 1252 wrote to memory of 4536 1252 3ba042d477d1e2e38ffa8fd55cff7010N.exe 88 PID 1252 wrote to memory of 4536 1252 3ba042d477d1e2e38ffa8fd55cff7010N.exe 88 PID 4536 wrote to memory of 2656 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe 89 PID 4536 wrote to memory of 2656 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe 89 PID 4536 wrote to memory of 2656 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe 89 PID 4536 wrote to memory of 2232 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe 92 PID 4536 wrote to memory of 2232 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe 92 PID 4536 wrote to memory of 2232 4536 3ba042d477d1e2e38ffa8fd55cff7010N.exe 92 PID 2232 wrote to memory of 4356 2232 cmd.exe 94 PID 2232 wrote to memory of 4356 2232 cmd.exe 94 PID 2232 wrote to memory of 4356 2232 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exe"C:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exeC:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exe" /TN IpGA05kf87aa /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2656
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN IpGA05kf87aa > C:\Users\Admin\AppData\Local\Temp\mvpmK.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN IpGA05kf87aa4⤵
- System Location Discovery: System Language Discovery
PID:4356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 6043⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 6283⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 7243⤵
- Program crash
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 7283⤵
- Program crash
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 6203⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 7803⤵
- Program crash
PID:2860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 14683⤵
- Program crash
PID:3968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 14843⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 17443⤵
- Program crash
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 14803⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 17963⤵
- Program crash
PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 15963⤵
- Program crash
PID:3568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 18163⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 18323⤵
- Program crash
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 18483⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 15443⤵
- Program crash
PID:2980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 18483⤵
- Program crash
PID:2328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 17843⤵
- Program crash
PID:4352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4536 -ip 45361⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4536 -ip 45361⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4536 -ip 45361⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4536 -ip 45361⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4536 -ip 45361⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4536 -ip 45361⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4536 -ip 45361⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4536 -ip 45361⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4536 -ip 45361⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4536 -ip 45361⤵PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4536 -ip 45361⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4536 -ip 45361⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4536 -ip 45361⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4536 -ip 45361⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4536 -ip 45361⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4536 -ip 45361⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4536 -ip 45361⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4536 -ip 45361⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD5ba8d298b193653f000e45364eda3d183
SHA1a3a9b9243dd92691cf64857d0c44a73b3a42763d
SHA2561d09598a88ce0ad18db0bccd613bdbb4b72aed0b2486da2f60cce3411f4bde72
SHA51210bbedb84543f1f7a3333a65233b6ab4e737f42dd31fb34341e42ce372cc6ba16fd52caa2c96cc712da6478d057fd1d727045b6863ed311441d86c8807d01923
-
Filesize
1KB
MD573176e54e4355b8adb9f8539d5798389
SHA1a23da01d096ff1e29e299a0bd3077867d7d3c224
SHA256ac72715340ab74cf6a00084e88951c20420fb585d452b32dee68f106a619d60e
SHA512e0d06acc99b86b266127dfc168689c093a64d0522abbf9a1f54ff22ccd2072c53d09983f0a819ccf0c98dea880495c1e7ccf3c62751bc0faae78ede6f5127bf4