Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
Resource
win10v2004-20220812-en
General
-
Target
765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
-
Size
96KB
-
MD5
6b77fb4dbc2d50b5e6e1713799e5b7cc
-
SHA1
bbc2e9d9c5f6087d0aa8db4c68cfc436ece24ccd
-
SHA256
765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db
-
SHA512
fd2bb027691ca5e16c3b323644aa8524bc274c5580a3c9cac52ff8cc9d11eee818cacec8429dc6919ae1d2007131fc5a689f1d24c0e11a1b358a0d9cdeca7fda
-
SSDEEP
1536:q8kcu4l7dSZ9T+2mxPAsL/JbuOLZ64ZCPBKbnziw1dVOcwCCQc+VDM+QJtOw/:wcj7k/y2mxB9uMzZCPBK1Dw9Raw/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1520 taskhost.exe 1320 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 900 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 900 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1212 set thread context of 900 1212 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 27 PID 1520 set thread context of 1320 1520 taskhost.exe 29 -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 taskhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 taskhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1212 wrote to memory of 900 1212 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 27 PID 1212 wrote to memory of 900 1212 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 27 PID 1212 wrote to memory of 900 1212 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 27 PID 1212 wrote to memory of 900 1212 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 27 PID 1212 wrote to memory of 900 1212 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 27 PID 1212 wrote to memory of 900 1212 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 27 PID 900 wrote to memory of 1520 900 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 28 PID 900 wrote to memory of 1520 900 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 28 PID 900 wrote to memory of 1520 900 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 28 PID 900 wrote to memory of 1520 900 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 28 PID 1520 wrote to memory of 1320 1520 taskhost.exe 29 PID 1520 wrote to memory of 1320 1520 taskhost.exe 29 PID 1520 wrote to memory of 1320 1520 taskhost.exe 29 PID 1520 wrote to memory of 1320 1520 taskhost.exe 29 PID 1520 wrote to memory of 1320 1520 taskhost.exe 29 PID 1520 wrote to memory of 1320 1520 taskhost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe"C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exeC:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1320
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53e8783189fae0711ed8cdf8ac87c0770
SHA19a63d3775dbd267e39c00a549e9cb3ffea3b087b
SHA2563cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e
SHA51207fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608
-
Filesize
96KB
MD53e8783189fae0711ed8cdf8ac87c0770
SHA19a63d3775dbd267e39c00a549e9cb3ffea3b087b
SHA2563cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e
SHA51207fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608
-
Filesize
96KB
MD53e8783189fae0711ed8cdf8ac87c0770
SHA19a63d3775dbd267e39c00a549e9cb3ffea3b087b
SHA2563cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e
SHA51207fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608
-
Filesize
96KB
MD53e8783189fae0711ed8cdf8ac87c0770
SHA19a63d3775dbd267e39c00a549e9cb3ffea3b087b
SHA2563cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e
SHA51207fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608
-
Filesize
96KB
MD53e8783189fae0711ed8cdf8ac87c0770
SHA19a63d3775dbd267e39c00a549e9cb3ffea3b087b
SHA2563cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e
SHA51207fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608