Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 05:42

General

  • Target

    4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe

  • Size

    413KB

  • MD5

    e451b5df605f0d8c71aabdcd14c2d740

  • SHA1

    5a44a48c536377ef6b311c31dc42170b2c7e2277

  • SHA256

    4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4d

  • SHA512

    403efb9868f7c977182e47f5feddb33f13c3eb22e1147387d94b5410ca1ea39109dddf6efd1438f10cbc9dab45333ce9b497b048e4e072bbb07bb98693fea5e9

  • SSDEEP

    12288:Ax0L1e1+sztEFXdewVNNiHGuEUL7Jfa7nIC:Ax0L1qEPeWrNg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe
    "C:\Users\Admin\AppData\Local\Temp\4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4dN.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\Griwua.exe
      C:\Windows\Griwua.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 756
        3⤵
        • Program crash
        PID:89276
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 728 -ip 728
    1⤵
      PID:89304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Griwua.exe

      Filesize

      413KB

      MD5

      e451b5df605f0d8c71aabdcd14c2d740

      SHA1

      5a44a48c536377ef6b311c31dc42170b2c7e2277

      SHA256

      4ec77f5f77d8529a32f7dd57ddff7ad5965e205dce1cb7fc2a7b5810c0da3a4d

      SHA512

      403efb9868f7c977182e47f5feddb33f13c3eb22e1147387d94b5410ca1ea39109dddf6efd1438f10cbc9dab45333ce9b497b048e4e072bbb07bb98693fea5e9

    • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

      Filesize

      428B

      MD5

      eea5bbd43657efd3278c46a5fd7bd6ae

      SHA1

      6cd704d799d0220be4fa89665d504581e3dc33b7

      SHA256

      c69bf1fc1a2d494e53ed6c90e94a7a79f118aed0aa7378b413f93c0637c022cb

      SHA512

      be6a80e4a9f0f8c2d9c9548d34cbd0ac36ef500c5f90c9c1e3e706cd0c01b001757934d04b50621ff384e45f2f5e08d534de3137d02f163c5ed47c8bf3d852a8

    • memory/728-18-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/728-57512-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/728-142284-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/728-142283-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/4796-0-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/4796-1-0x00000000021B0000-0x00000000021B1000-memory.dmp

      Filesize

      4KB

    • memory/4796-4-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4796-29726-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/4796-54624-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB