Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
678903400.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
678903400.exe
Resource
win10v2004-20240802-en
General
-
Target
678903400.exe
-
Size
1.2MB
-
MD5
846323268cb0a9ba8260ff62acbaa5d0
-
SHA1
e19fb64e28dc5b9b15db7c5f6488ecbc6a10f83b
-
SHA256
e5cb5f90c07dff72f093ca0a1c1733a04b44dee8c0f6c2e3acbe475f7b6b08b4
-
SHA512
6e26f7258da83a8248150ee1d32744decb73aa68c0b8d7bf2d1fcd980384e35981ac3fa7a6c634265a578ed51efa12f9bf50352e6ec6d8fdb3ca681c59ee65b3
-
SSDEEP
24576:0Cdxte/80jYLT3U1jfsWaD6LZvaGdyS6x+OGS1rpgQ:lw80cTsjkWaD6x9E+O9
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2900-8-0x0000000000BA0000-0x0000000000FA0000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 3340 2900 678903400.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 3464 3340 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 678903400.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2900 678903400.exe 2900 678903400.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2900 678903400.exe 2900 678903400.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2900 678903400.exe 2900 678903400.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3340 2900 678903400.exe 86 PID 2900 wrote to memory of 3340 2900 678903400.exe 86 PID 2900 wrote to memory of 3340 2900 678903400.exe 86 PID 2900 wrote to memory of 3340 2900 678903400.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\678903400.exe"C:\Users\Admin\AppData\Local\Temp\678903400.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\678903400.exe"2⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 1923⤵
- Program crash
PID:3464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3340 -ip 33401⤵PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD52aa0dcb4ec4c2a67e60546d83d4f0259
SHA1308d340164240a371a885f914df786ac4fcc067c
SHA25652dd31f8a0503326c9a194ff50252aa1a803d38ea1286f39b187c49399a76a3b
SHA512e9ff4e959c913326c90c230825188a2e5bd329c57e71480c96104f8797a29e4ef6ca892d0733b882e924f0690ec91eaaa52dbf7ee2af52680febf612561a0e4d