Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 03:48 UTC

General

  • Target

    WcsPlugInService.ex.exe

  • Size

    113KB

  • MD5

    f9a974c8ed6793c226101c10af7542db

  • SHA1

    5719e5b45721af9ac9652332f2001d984e1d9a45

  • SHA256

    8f0c20eab317c9416ad6dd602013528dca8ee1467b111019fe6704ff8da6a241

  • SHA512

    1f00ca5c9fdb1ca8fe6d9b9728da6b3aac57b72e17e528ec37e77cdf6ae1cd52384b0ae8256e2f74f88ba87c9e90c575a0a8ebf729f894590fe71d5e6ce608d3

  • SSDEEP

    3072:pxuZMpyk7A79E6rdAXpRCxv/sqJ5SjTOaiZl7ObWlx+T:pYf79JAXKxHs0S3OaiZ1Oiv

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WcsPlugInService.ex.exe
    "C:\Users\Admin\AppData\Local\Temp\WcsPlugInService.ex.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 268
        3⤵
        • Program crash
        PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-0-0x0000000000FF0000-0x0000000001029000-memory.dmp

    Filesize

    228KB

  • memory/1628-1-0x0000000000AF0000-0x0000000000B09000-memory.dmp

    Filesize

    100KB

  • memory/1628-8-0x0000000000200000-0x0000000000215000-memory.dmp

    Filesize

    84KB

  • memory/1628-2-0x0000000000200000-0x0000000000215000-memory.dmp

    Filesize

    84KB

  • memory/1628-12-0x0000000000FF0000-0x0000000001029000-memory.dmp

    Filesize

    228KB

  • memory/1732-14-0x0000000000FA0000-0x0000000000FB4000-memory.dmp

    Filesize

    80KB

  • memory/1732-13-0x0000000000FA0000-0x0000000000FB4000-memory.dmp

    Filesize

    80KB

  • memory/1732-16-0x0000000000FA0000-0x0000000000FB4000-memory.dmp

    Filesize

    80KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.