Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe
Resource
win10v2004-20240802-en
General
-
Target
df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe
-
Size
272KB
-
MD5
35d9b178e3b72d5c8c58bf8a39e13b40
-
SHA1
979d7fd6819a57f35dda490d34785e7493802b2a
-
SHA256
df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173b
-
SHA512
21ef136a54f315beabd4fcd416236361114785cf45e36bb12324bc12186404c6549e093891f70a9578f031f02f71aa4d9c3fd1fccdea29ae0ce783a86f8087ab
-
SSDEEP
6144:cLIYnkKVa4zxkQnmo1mEcbWo2Yi8zLH9yy6atBWOw:cLDmFDpVv97tA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3652 df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe -
Executes dropped EXE 1 IoCs
pid Process 3652 df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3100 2112 WerFault.exe 83 4328 3652 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2112 df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3652 df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3652 2112 df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe 88 PID 2112 wrote to memory of 3652 2112 df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe 88 PID 2112 wrote to memory of 3652 2112 df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe"C:\Users\Admin\AppData\Local\Temp\df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 3962⤵
- Program crash
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exeC:\Users\Admin\AppData\Local\Temp\df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 3643⤵
- Program crash
PID:4328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2112 -ip 21121⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3652 -ip 36521⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\df624b59d503cde2be198b6c2ccdf97f5f0e44382c9065e70f604703ae99173bN.exe
Filesize272KB
MD55e1b459f1fdd6c6c08d16fc824d23930
SHA13538b926a86e0192a079479e99ccf549a0a3ba65
SHA2563e07ff6e3bf787ad41ce0f5b0f2a890a2b3baaf15e4249569d9e7f659f83b623
SHA5129b6c8261c09f0be5f721ba2a7eff68b3f881daa11fe685f37db45a6838848c09f51a5486771e741373cacda445015248ca7877952dfec957535408ad1b132850