Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
tppxqd.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
tppxqd.exe
Resource
win10v2004-20241007-en
General
-
Target
f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe
-
Size
367KB
-
MD5
2818c9adb483309e0d5b2515b41a1507
-
SHA1
6f30bfff6c27aef73be247dfd2333b6845876afc
-
SHA256
f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a
-
SHA512
b8b212bf7f7d0f28608681a3a65ec696f1f302aefc8fb1e37ff53df07e6b3a7a3a7f5650ddd0b897f7681a892129feebebc968deddb279c1808a7154d1128b19
-
SSDEEP
6144:TGiSUQepf9SGF0VBfXxG6xbXKJArYr0hOZg2guur3Hw03:mUd132BvIObXKeYohGLI3R3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5076 tppxqd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4672 5076 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tppxqd.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3076 wrote to memory of 5076 3076 f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe 82 PID 3076 wrote to memory of 5076 3076 f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe 82 PID 3076 wrote to memory of 5076 3076 f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe 82 PID 5076 wrote to memory of 2084 5076 tppxqd.exe 83 PID 5076 wrote to memory of 2084 5076 tppxqd.exe 83 PID 5076 wrote to memory of 2084 5076 tppxqd.exe 83 PID 5076 wrote to memory of 2084 5076 tppxqd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe"C:\Users\Admin\AppData\Local\Temp\f42692e58c63c0e14de4ce2bb31a92cb1bc5dbb11d0989f1619778fd4b7e2c5a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\tppxqd.exeC:\Users\Admin\AppData\Local\Temp\tppxqd.exe C:\Users\Admin\AppData\Local\Temp\javajcgag2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\tppxqd.exeC:\Users\Admin\AppData\Local\Temp\tppxqd.exe C:\Users\Admin\AppData\Local\Temp\javajcgag3⤵PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 5563⤵
- Program crash
PID:4672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5076 -ip 50761⤵PID:920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD57afc9c0913886b271a94e2fd65948e89
SHA1f7d03107689ab4bf5b2bc498a27c833786e61296
SHA25670b0b30720dea145d86b5a65c9aeb7d91d385e70697cb38dcb851f83cf36e1d6
SHA5120623d890c3da06b22ba543d9af57da647eddfc74849a5db32b9e807fa9112554cf977ba1b342d00897c61eb641aa679d0294de529f41ba2cefed45c8fb9cba9a
-
Filesize
5KB
MD52cfb45713bf39a8b12312afeb8eeb863
SHA1cdba2316f0374f2d6724e96ea4b4a6e4cc6782bc
SHA2562420bb9b1c506c66cbcee9c739d39f9c0723aec89ac4dcee10d48bd8b17d7f92
SHA5124394ac8470148989df4540f84fb74f6d3dc3df77ca3e2e7d100d90330bb09a52d288a1d96b81d79c3e7a692949fbdea2f036db244c471582ed9dad4aa471d63a
-
Filesize
114KB
MD53a4bc4e7fa9caf7ebc996222816d9ec2
SHA115e37286a7982a35092559743e7a2aadb2300a64
SHA25656cd59981b0b8cf25d7d51c96b1cba9e300bc002a01030a08eb58ea30c015ef7
SHA51226c6481987b859922c504fdc353cc1819943d9fbecea38cb01b0c708566788aca4fa5ff56c3e8f7a12be9be10dbbaca517f7423c00eb79d494cc83996a67b448