Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe
Resource
win10v2004-20221111-en
General
-
Target
51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe
-
Size
96KB
-
MD5
38d3d60dd60f03bf35c59ae266b60000
-
SHA1
9a18b3d2cae630ff28759f68904b3ed21bf7312e
-
SHA256
51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb
-
SHA512
46783358d8ec77ddea3e50cf489b7ec85aceb7f30c2cb1587d1ebf87a65be7737181e9cbeff0e018ec4e5d18e95f7783b7095c84f93b33743d686fdaf71225f1
-
SSDEEP
1536:y8fGHUrKRtrhcamH7XVkEmiSngrR92SjuJ7cPcj3CnisY3A2ro4dxti/:jGH2KRXc3blXmtnitjuJG6SisYQT4b4/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1576 taskhost.exe 1264 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1628 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 1628 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1620 set thread context of 1628 1620 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 28 PID 1576 set thread context of 1264 1576 taskhost.exe 30 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 taskhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1628 1620 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 28 PID 1620 wrote to memory of 1628 1620 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 28 PID 1620 wrote to memory of 1628 1620 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 28 PID 1620 wrote to memory of 1628 1620 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 28 PID 1620 wrote to memory of 1628 1620 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 28 PID 1620 wrote to memory of 1628 1620 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 28 PID 1628 wrote to memory of 1576 1628 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 29 PID 1628 wrote to memory of 1576 1628 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 29 PID 1628 wrote to memory of 1576 1628 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 29 PID 1628 wrote to memory of 1576 1628 51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe 29 PID 1576 wrote to memory of 1264 1576 taskhost.exe 30 PID 1576 wrote to memory of 1264 1576 taskhost.exe 30 PID 1576 wrote to memory of 1264 1576 taskhost.exe 30 PID 1576 wrote to memory of 1264 1576 taskhost.exe 30 PID 1576 wrote to memory of 1264 1576 taskhost.exe 30 PID 1576 wrote to memory of 1264 1576 taskhost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe"C:\Users\Admin\AppData\Local\Temp\51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exeC:\Users\Admin\AppData\Local\Temp\51e3964a256a56b3bde6d1089d23e64da698dece292d18f007cb9c840b6f57fb.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1264
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55ab354760105e5cb6f192f3096b4e204
SHA13b9e57bfe2d9306f08fce510cd65b464fcf0a98e
SHA25637edd34c48f796540d10f55ad757ad89286d6263a87397c4ddd088eb4fe4eda8
SHA512a1b0529633f2ec6a35ee0e18b5502f5c61f834b8fa9c19fcaee37f4689202556523e984e325128e5927c87170053eb1afb4352902d53cc9297c63da2c57d19b8
-
Filesize
96KB
MD55ab354760105e5cb6f192f3096b4e204
SHA13b9e57bfe2d9306f08fce510cd65b464fcf0a98e
SHA25637edd34c48f796540d10f55ad757ad89286d6263a87397c4ddd088eb4fe4eda8
SHA512a1b0529633f2ec6a35ee0e18b5502f5c61f834b8fa9c19fcaee37f4689202556523e984e325128e5927c87170053eb1afb4352902d53cc9297c63da2c57d19b8
-
Filesize
96KB
MD55ab354760105e5cb6f192f3096b4e204
SHA13b9e57bfe2d9306f08fce510cd65b464fcf0a98e
SHA25637edd34c48f796540d10f55ad757ad89286d6263a87397c4ddd088eb4fe4eda8
SHA512a1b0529633f2ec6a35ee0e18b5502f5c61f834b8fa9c19fcaee37f4689202556523e984e325128e5927c87170053eb1afb4352902d53cc9297c63da2c57d19b8
-
Filesize
96KB
MD55ab354760105e5cb6f192f3096b4e204
SHA13b9e57bfe2d9306f08fce510cd65b464fcf0a98e
SHA25637edd34c48f796540d10f55ad757ad89286d6263a87397c4ddd088eb4fe4eda8
SHA512a1b0529633f2ec6a35ee0e18b5502f5c61f834b8fa9c19fcaee37f4689202556523e984e325128e5927c87170053eb1afb4352902d53cc9297c63da2c57d19b8
-
Filesize
96KB
MD55ab354760105e5cb6f192f3096b4e204
SHA13b9e57bfe2d9306f08fce510cd65b464fcf0a98e
SHA25637edd34c48f796540d10f55ad757ad89286d6263a87397c4ddd088eb4fe4eda8
SHA512a1b0529633f2ec6a35ee0e18b5502f5c61f834b8fa9c19fcaee37f4689202556523e984e325128e5927c87170053eb1afb4352902d53cc9297c63da2c57d19b8