Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220718-en -
submitted
01/08/2022, 16:25
Behavioral task
behavioral1
Sample
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe
Resource
win10v2004-20220721-en
General
-
Target
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe
-
Size
16KB
-
MD5
c0b012940a1af20a1a1ea6009f7b0faa
-
SHA1
d50c830572bd7d097606458cc4bdeeab16c1e589
-
SHA256
5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba
-
SHA512
3b41136dd0b8dc9adb953d7f48a30478afc50f0e5126084639fa8ef450e84d6cdda2190fd61ad3a32198d7e8bce373975d7b30fa9063866ebedd2c728311861c
-
SSDEEP
384:xCdvSPlZH19GTXjdh8DZuujYcV6AUwJFZb:x0wnV9AhgZfYcV6Dw9b
Malware Config
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1988-54-0x0000000000A10000-0x0000000000A1A000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Webhost.url 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe" 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webhost = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe" 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1412 schtasks.exe 1028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe Token: SeDebugPrivilege 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1780 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 26 PID 1988 wrote to memory of 1780 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 26 PID 1988 wrote to memory of 1780 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 26 PID 1988 wrote to memory of 1780 1988 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 26 PID 1780 wrote to memory of 1412 1780 cmd.exe 28 PID 1780 wrote to memory of 1412 1780 cmd.exe 28 PID 1780 wrote to memory of 1412 1780 cmd.exe 28 PID 1780 wrote to memory of 1412 1780 cmd.exe 28 PID 1520 wrote to memory of 1536 1520 taskeng.exe 31 PID 1520 wrote to memory of 1536 1520 taskeng.exe 31 PID 1520 wrote to memory of 1536 1520 taskeng.exe 31 PID 1520 wrote to memory of 1536 1520 taskeng.exe 31 PID 1536 wrote to memory of 1052 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 32 PID 1536 wrote to memory of 1052 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 32 PID 1536 wrote to memory of 1052 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 32 PID 1536 wrote to memory of 1052 1536 5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe 32 PID 1052 wrote to memory of 1028 1052 cmd.exe 34 PID 1052 wrote to memory of 1028 1052 cmd.exe 34 PID 1052 wrote to memory of 1028 1052 cmd.exe 34 PID 1052 wrote to memory of 1028 1052 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe"C:\Users\Admin\AppData\Local\Temp\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Creates scheduled task(s)
PID:1412
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1842259C-14F5-4BB1-890B-C1952EFA4672} S-1-5-21-3762437355-3468409815-1164039494-1000:TZEOUYSL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exeC:\Users\Admin\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \System\SecurityServiceUpdate /tr %userprofile%\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \System\SecurityServiceUpdate /tr C:\Users\Admin\AppData\Roaming\Windows\5bdda6d0d85e1bb3920921744791845de2394f37e04fda94cde2f05e282052ba.exe /st 00:00 /du 9999:59 /sc daily /ri 5 /f4⤵
- Creates scheduled task(s)
PID:1028
-
-
-