Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23/09/2023, 03:54
Behavioral task
behavioral1
Sample
f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe
Resource
win7-20230831-en
General
-
Target
f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe
-
Size
2.4MB
-
MD5
aef8e3aca1dd4001b2a1d08ca9263b1b
-
SHA1
7174a20707f704a25a47c4a35f132034647eb24f
-
SHA256
f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8
-
SHA512
121019179d77d0031121424a111e22dc1c2704f394be381999fa1bce4de507011ea9be0ee3257a0aa2d9108521adb6334f35dd2b992ab47e341d5d6f4b31b9ab
-
SSDEEP
49152:bFn7G4/Kx7vwbkH+7yxto5sl2XCL9HD35JH0mXGaTF9BDrJQvExcPXiHsq:b57G4ccbke7wto5slxL9HzbBWaTjBrLb
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0032000000014ab9-17.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2816 usbtechsh.exe -
Loads dropped DLL 2 IoCs
pid Process 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe 2616 cmd.exe -
resource yara_rule behavioral1/files/0x0032000000014ab9-17.dat upx behavioral1/memory/2148-19-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2148-22-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2148-21-0x0000000010000000-0x000000001003D000-memory.dmp upx -
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x0000000000963000-memory.dmp vmprotect behavioral1/memory/2148-1-0x0000000000400000-0x0000000000963000-memory.dmp vmprotect behavioral1/memory/2148-26-0x0000000000400000-0x0000000000963000-memory.dmp vmprotect behavioral1/memory/2148-27-0x0000000000400000-0x0000000000963000-memory.dmp vmprotect -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2616 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe 29 PID 2148 wrote to memory of 2616 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe 29 PID 2148 wrote to memory of 2616 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe 29 PID 2148 wrote to memory of 2616 2148 f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe 29 PID 2616 wrote to memory of 2816 2616 cmd.exe 31 PID 2616 wrote to memory of 2816 2616 cmd.exe 31 PID 2616 wrote to memory of 2816 2616 cmd.exe 31 PID 2616 wrote to memory of 2816 2616 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe"C:\Users\Admin\AppData\Local\Temp\f50c9b0efa555496e5421d0889f2d74ace20af8456d130e618f7857cacd62ad8.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\usb\usbtechsh.exe -list2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\usb\usbtechsh.exeC:\usb\usbtechsh.exe -list3⤵
- Executes dropped EXE
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5bbbedc7b528797ffb5a906129ba220df
SHA1612af05ffbb1690361f94a2455bbde4c828d5227
SHA256fb08c198d3a3f678603174da463bac7ab76a9b8246a6d7000054085607d0634c
SHA5124d6e2f87dba80f2fec161f38800eb56a554cf991d274393dc787ca4ac86797414e7049a4d20f6992ad23823c370a2e3aaa29d81dd019f50db13a90763d092316
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
Filesize
220KB
MD5bbbedc7b528797ffb5a906129ba220df
SHA1612af05ffbb1690361f94a2455bbde4c828d5227
SHA256fb08c198d3a3f678603174da463bac7ab76a9b8246a6d7000054085607d0634c
SHA5124d6e2f87dba80f2fec161f38800eb56a554cf991d274393dc787ca4ac86797414e7049a4d20f6992ad23823c370a2e3aaa29d81dd019f50db13a90763d092316