Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe
Resource
win10v2004-20221111-en
General
-
Target
ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe
-
Size
132KB
-
MD5
a0dbec02e61a0cb615463daaabca4004
-
SHA1
853898dfb4262fbfbb60edbcb6fb9f44d1c14220
-
SHA256
ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237
-
SHA512
e1f08cb4dccea95e11a340bc08426a8913c676f242400ce1fb5dba2cb2668147ffb4cab559edbb4a4670a2f560ab19c868ce674ba687f085c47adc44fdafb4fc
-
SSDEEP
1536:yd+zAUTXwbuVjaajd21dhOfct0G/yZjigL0q3jBnOgOtOTM/jh81ASGLUI5p1kSQ:YsDwbWxZfct0G/uFjxOHImjCcZXaS4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1464 taskhost.exe 552 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 1228 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1340 set thread context of 1228 1340 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 27 PID 1464 set thread context of 552 1464 taskhost.exe 29 -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 taskhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 taskhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1228 1340 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 27 PID 1340 wrote to memory of 1228 1340 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 27 PID 1340 wrote to memory of 1228 1340 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 27 PID 1340 wrote to memory of 1228 1340 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 27 PID 1340 wrote to memory of 1228 1340 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 27 PID 1340 wrote to memory of 1228 1340 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 27 PID 1228 wrote to memory of 1464 1228 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 28 PID 1228 wrote to memory of 1464 1228 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 28 PID 1228 wrote to memory of 1464 1228 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 28 PID 1228 wrote to memory of 1464 1228 ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe 28 PID 1464 wrote to memory of 552 1464 taskhost.exe 29 PID 1464 wrote to memory of 552 1464 taskhost.exe 29 PID 1464 wrote to memory of 552 1464 taskhost.exe 29 PID 1464 wrote to memory of 552 1464 taskhost.exe 29 PID 1464 wrote to memory of 552 1464 taskhost.exe 29 PID 1464 wrote to memory of 552 1464 taskhost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe"C:\Users\Admin\AppData\Local\Temp\ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exeC:\Users\Admin\AppData\Local\Temp\ca7bb8787ca5c97a0236527c7d3225a4bfc25a9e7bbb54e717980c99c0dc2237.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:552
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD54a6018e354be2f95949143ba93d46836
SHA15c286fd9d2af69fcc28da09d4258160ed0d9a641
SHA256a38ed8f395edc846bfdfbd5abaef0b05acb3d962d6c5b9abd5b5f8b7fe62463d
SHA512f512ce9f2822ff23fc04c36c0a864c3ea66b19e7050017206e2b4555034ab663cf62396d799dc42e30913d2da355029621c8bc65b33c47e665de48c95cc35b92
-
Filesize
132KB
MD54a6018e354be2f95949143ba93d46836
SHA15c286fd9d2af69fcc28da09d4258160ed0d9a641
SHA256a38ed8f395edc846bfdfbd5abaef0b05acb3d962d6c5b9abd5b5f8b7fe62463d
SHA512f512ce9f2822ff23fc04c36c0a864c3ea66b19e7050017206e2b4555034ab663cf62396d799dc42e30913d2da355029621c8bc65b33c47e665de48c95cc35b92
-
Filesize
132KB
MD54a6018e354be2f95949143ba93d46836
SHA15c286fd9d2af69fcc28da09d4258160ed0d9a641
SHA256a38ed8f395edc846bfdfbd5abaef0b05acb3d962d6c5b9abd5b5f8b7fe62463d
SHA512f512ce9f2822ff23fc04c36c0a864c3ea66b19e7050017206e2b4555034ab663cf62396d799dc42e30913d2da355029621c8bc65b33c47e665de48c95cc35b92
-
Filesize
132KB
MD54a6018e354be2f95949143ba93d46836
SHA15c286fd9d2af69fcc28da09d4258160ed0d9a641
SHA256a38ed8f395edc846bfdfbd5abaef0b05acb3d962d6c5b9abd5b5f8b7fe62463d
SHA512f512ce9f2822ff23fc04c36c0a864c3ea66b19e7050017206e2b4555034ab663cf62396d799dc42e30913d2da355029621c8bc65b33c47e665de48c95cc35b92
-
Filesize
132KB
MD54a6018e354be2f95949143ba93d46836
SHA15c286fd9d2af69fcc28da09d4258160ed0d9a641
SHA256a38ed8f395edc846bfdfbd5abaef0b05acb3d962d6c5b9abd5b5f8b7fe62463d
SHA512f512ce9f2822ff23fc04c36c0a864c3ea66b19e7050017206e2b4555034ab663cf62396d799dc42e30913d2da355029621c8bc65b33c47e665de48c95cc35b92