Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04/06/2022, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe
Resource
win10v2004-20220414-en
General
-
Target
0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe
-
Size
16KB
-
MD5
8b23aa9f667277aa0c81ab9a9d325c4a
-
SHA1
b21ff7786eab0839ad884f86460733f2e8e7aa8d
-
SHA256
0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a
-
SHA512
2d349a6ed1111a6936aa48c29c581c7dc47e95ca7974bd64db184eb50c925aed1f3047e0247cc966179dee0d2981486bdef84dc4dadd59ec0d2a362d59ff21a2
Malware Config
Signatures
-
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1080-54-0x0000000000380000-0x000000000038A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe" 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1168 1080 WerFault.exe 27 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1080 wrote to memory of 908 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 28 PID 1080 wrote to memory of 908 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 28 PID 1080 wrote to memory of 908 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 28 PID 1080 wrote to memory of 908 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 28 PID 908 wrote to memory of 1220 908 cmd.exe 30 PID 908 wrote to memory of 1220 908 cmd.exe 30 PID 908 wrote to memory of 1220 908 cmd.exe 30 PID 908 wrote to memory of 1220 908 cmd.exe 30 PID 1080 wrote to memory of 1168 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 32 PID 1080 wrote to memory of 1168 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 32 PID 1080 wrote to memory of 1168 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 32 PID 1080 wrote to memory of 1168 1080 0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe"C:\Users\Admin\AppData\Local\Temp\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\0e37b4d9305fd9fd1cae80102ed94314b87ac644bf2b133c5965a4d3f081579a.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:1220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 12282⤵
- Program crash
PID:1168
-