Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
221s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe
Resource
win10v2004-20220901-en
General
-
Target
ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe
-
Size
136KB
-
MD5
8c4f39320d7c4eea6b3e072106b282bf
-
SHA1
6ae3da39b56a665c3586099cbac685067d7442b0
-
SHA256
ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c
-
SHA512
035b61fca54b05f12de676a66eedce5a9474690a6a6cff29614af94368b8505ff34446967179bd960d2b92bc5a96256f2a1d2fb41e3bdeae80a439287166b8d4
-
SSDEEP
1536:6MVDsEe+yoBaVzlhNCg6k3j5kgOXUq+rtQ/QQkAT9TmY+R6rk3qZOPf:rplyoBaVphV6AtkgOXUqaaF9Tmb6yf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 520 taskhost.exe 2032 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 468 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 468 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 268 set thread context of 468 268 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 28 PID 520 set thread context of 2032 520 taskhost.exe 30 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 268 wrote to memory of 468 268 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 28 PID 268 wrote to memory of 468 268 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 28 PID 268 wrote to memory of 468 268 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 28 PID 268 wrote to memory of 468 268 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 28 PID 268 wrote to memory of 468 268 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 28 PID 268 wrote to memory of 468 268 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 28 PID 468 wrote to memory of 520 468 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 29 PID 468 wrote to memory of 520 468 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 29 PID 468 wrote to memory of 520 468 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 29 PID 468 wrote to memory of 520 468 ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe 29 PID 520 wrote to memory of 2032 520 taskhost.exe 30 PID 520 wrote to memory of 2032 520 taskhost.exe 30 PID 520 wrote to memory of 2032 520 taskhost.exe 30 PID 520 wrote to memory of 2032 520 taskhost.exe 30 PID 520 wrote to memory of 2032 520 taskhost.exe 30 PID 520 wrote to memory of 2032 520 taskhost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe"C:\Users\Admin\AppData\Local\Temp\ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exeC:\Users\Admin\AppData\Local\Temp\ebc511ed3c477639ee9c6d56506346044f963d6cb713b3c81341add9aa52191c.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:2032
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5685c988850fc65706157bded578b507e
SHA18f1a6e53de157915cc30732c96c213589713d0ed
SHA256c77feefdfc67f4a0488ef58b774e2d8814d5bdfa8c215e82b8991807d712c90c
SHA512ed8bb993a5788eb545bf6cb99981bed3739885f16e95495784d066cb59273012a1aaef072516084290aedbd4c4dc77d86803fd7d68c8dbacc98f308fc0a7292e
-
Filesize
136KB
MD5685c988850fc65706157bded578b507e
SHA18f1a6e53de157915cc30732c96c213589713d0ed
SHA256c77feefdfc67f4a0488ef58b774e2d8814d5bdfa8c215e82b8991807d712c90c
SHA512ed8bb993a5788eb545bf6cb99981bed3739885f16e95495784d066cb59273012a1aaef072516084290aedbd4c4dc77d86803fd7d68c8dbacc98f308fc0a7292e
-
Filesize
136KB
MD5685c988850fc65706157bded578b507e
SHA18f1a6e53de157915cc30732c96c213589713d0ed
SHA256c77feefdfc67f4a0488ef58b774e2d8814d5bdfa8c215e82b8991807d712c90c
SHA512ed8bb993a5788eb545bf6cb99981bed3739885f16e95495784d066cb59273012a1aaef072516084290aedbd4c4dc77d86803fd7d68c8dbacc98f308fc0a7292e
-
Filesize
136KB
MD5685c988850fc65706157bded578b507e
SHA18f1a6e53de157915cc30732c96c213589713d0ed
SHA256c77feefdfc67f4a0488ef58b774e2d8814d5bdfa8c215e82b8991807d712c90c
SHA512ed8bb993a5788eb545bf6cb99981bed3739885f16e95495784d066cb59273012a1aaef072516084290aedbd4c4dc77d86803fd7d68c8dbacc98f308fc0a7292e
-
Filesize
136KB
MD5685c988850fc65706157bded578b507e
SHA18f1a6e53de157915cc30732c96c213589713d0ed
SHA256c77feefdfc67f4a0488ef58b774e2d8814d5bdfa8c215e82b8991807d712c90c
SHA512ed8bb993a5788eb545bf6cb99981bed3739885f16e95495784d066cb59273012a1aaef072516084290aedbd4c4dc77d86803fd7d68c8dbacc98f308fc0a7292e