Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win10v2004-20240802-en
General
-
Target
out.exe
-
Size
96KB
-
MD5
f527b00720bc9af6ed28a6efa242355a
-
SHA1
a7ad18f3fd69a27627e5894273f0d57761c2bda8
-
SHA256
b6a17ffeb44a4aeb227e83ec739c1451945ef9e60f1b660fd52076aa1ee02f11
-
SHA512
f1895bd4464ec80caca237903cdb971b40458476a17047e6e25dc32f646496a4b9f0cce07c8c1e338f89b7a9927e3b390a6f37b054e8cbe185bb0478ab940cab
-
SSDEEP
1536:+JTlybjXwFcBLy5DJl7lSD0HwNaO3cclxQj+WSUrxXV3J10:+JQjgFuLypvJg0QNaO3cclxQj+WX1XVo
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 2516 2240 out.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4784 2516 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language out.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2240 out.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2516 2240 out.exe 83 PID 2240 wrote to memory of 2516 2240 out.exe 83 PID 2240 wrote to memory of 2516 2240 out.exe 83 PID 2240 wrote to memory of 2516 2240 out.exe 83 PID 2240 wrote to memory of 2516 2240 out.exe 83 PID 2240 wrote to memory of 2516 2240 out.exe 83 PID 2240 wrote to memory of 2516 2240 out.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\out.exe"C:\Users\Admin\AppData\Local\Temp\out.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\out.exeC:\Users\Admin\AppData\Local\Temp\out.exe2⤵PID:2516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 4603⤵
- Program crash
PID:4784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2516 -ip 25161⤵PID:392