Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe
Resource
win10v2004-20240802-en
General
-
Target
507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe
-
Size
1.0MB
-
MD5
55ea552c28a453b193fc5c3f198bec50
-
SHA1
40d947bb42ea364eeb68dec2f51fb397a046f7fa
-
SHA256
507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6
-
SHA512
2f1272d722ba05807c9ff2fd0cff4aa8f975b2a48294ff5ae19e5c8fb37f223037acf3c8a354ae72aed64137bd745932cc4fb9bdc4d4a6c77269c40120aea881
-
SSDEEP
24576:msVaXLsJR0z/WbtibEQY7Cny+8a/ZSbH77Lv+f6T8f:mWJR0z/Wbki7+8g4Hbg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2904 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 12 pastebin.com -
Program crash 15 IoCs
pid pid_target Process procid_target 3192 2000 WerFault.exe 84 3064 2904 WerFault.exe 89 4688 2904 WerFault.exe 89 3916 2904 WerFault.exe 89 3584 2904 WerFault.exe 89 4120 2904 WerFault.exe 89 4004 2904 WerFault.exe 89 4892 2904 WerFault.exe 89 2892 2904 WerFault.exe 89 4904 2904 WerFault.exe 89 4732 2904 WerFault.exe 89 4884 2904 WerFault.exe 89 4428 2904 WerFault.exe 89 368 2904 WerFault.exe 89 3108 2904 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe 2904 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2000 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2904 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2904 2000 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe 89 PID 2000 wrote to memory of 2904 2000 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe 89 PID 2000 wrote to memory of 2904 2000 507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe"C:\Users\Admin\AppData\Local\Temp\507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 3442⤵
- Program crash
PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exeC:\Users\Admin\AppData\Local\Temp\507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 3443⤵
- Program crash
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 6363⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 6443⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 6883⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 7363⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 9203⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 14083⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 14963⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 16843⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 14483⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 14403⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 15003⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 14643⤵
- Program crash
PID:368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 16483⤵
- Program crash
PID:3108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2000 -ip 20001⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2904 -ip 29041⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2904 -ip 29041⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2904 -ip 29041⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2904 -ip 29041⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2904 -ip 29041⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2904 -ip 29041⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2904 -ip 29041⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2904 -ip 29041⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2904 -ip 29041⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2904 -ip 29041⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2904 -ip 29041⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2904 -ip 29041⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2904 -ip 29041⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2904 -ip 29041⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\507f1cf490012b139c9b33e5ef980e7375535379ae2a3854ce0204289f3a61a6N.exe
Filesize1.0MB
MD51d7ae4a87f454b434738ee684fe774ab
SHA1ca4b80ea1c96c6ddd28a73219114329e8f90a56c
SHA256c628aaac2a90c1ae1f648636eef515dd97e37ce0edc7d3af5cb488b18ad4d6d6
SHA5120f817ace12148254b4299b32a681d0413b16e04701f18bc4941cec7e8bd48d87934f1d93f7f871b930aa075d984f46bcaba4a80a5748efab90759c4d1c74b60d