Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18/12/2020, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
taskhost.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
taskhost.exe
-
Size
83KB
-
MD5
3f28f4aebf8fa5fc27f5e3b72dac993f
-
SHA1
9c03a13ec3c2baa597ae1c759baea9d57ace4599
-
SHA256
146bcd0d720f43d289c66d3a3cdc77e5e5a3d924174ee1993ac6db2cb0ca8026
-
SHA512
13c7007f3918350be0f201ebca153f6967302ac1136ea9cd08b8f6d6b12772c8fc1dab05a1458db059db197fd5b04875e315064b6029dc68d558074a7648b595
Malware Config
Extracted
Family
buer
C2
softwareconsbank.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1256-3-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral1/memory/1256-4-0x0000000040005DA8-mapping.dmp buer behavioral1/memory/1256-5-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Loads dropped DLL 1 IoCs
pid Process 1680 taskhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 1256 1680 taskhost.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1680 taskhost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1256 1680 taskhost.exe 29 PID 1680 wrote to memory of 1256 1680 taskhost.exe 29 PID 1680 wrote to memory of 1256 1680 taskhost.exe 29 PID 1680 wrote to memory of 1256 1680 taskhost.exe 29 PID 1680 wrote to memory of 1256 1680 taskhost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"2⤵PID:1256
-