Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 11:16 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1216487a086dc8449101bc30b96162aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1216487a086dc8449101bc30b96162aa.exe
Resource
win10v2004-20231215-en
General
-
Target
1216487a086dc8449101bc30b96162aa.exe
-
Size
27KB
-
MD5
1216487a086dc8449101bc30b96162aa
-
SHA1
ff4922b842eaa959e705510cb6c9d3b5a98540a8
-
SHA256
d85cdfdf2251c21367bffa397e14342616e97777c13a7ad8f86fe096e2ad485c
-
SHA512
9a638f1439261b5dd3696f0417f36837d46a2b25ff21dbb52e97cfc8a87c157e4bf8e10f45a3c4834988f36bf95e560a333581a83a960e32720aa26057b36ace
-
SSDEEP
384:uYWgasxFqgqj9VonbGlX3M/3h/Gys0b+alVvHEuCdSlhLnlgM11KljtOpvRMdH:uY7asxuj9OQOjDllzqOpvyH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2496 77249ee6-ec0e-4f03-a859-3d5752a6758b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 1216487a086dc8449101bc30b96162aa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 1216487a086dc8449101bc30b96162aa.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1052 1216487a086dc8449101bc30b96162aa.exe 1052 1216487a086dc8449101bc30b96162aa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1052 1216487a086dc8449101bc30b96162aa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2496 1052 1216487a086dc8449101bc30b96162aa.exe 28 PID 1052 wrote to memory of 2496 1052 1216487a086dc8449101bc30b96162aa.exe 28 PID 1052 wrote to memory of 2496 1052 1216487a086dc8449101bc30b96162aa.exe 28 PID 1052 wrote to memory of 2496 1052 1216487a086dc8449101bc30b96162aa.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1216487a086dc8449101bc30b96162aa.exe"C:\Users\Admin\AppData\Local\Temp\1216487a086dc8449101bc30b96162aa.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\77249ee6-ec0e-4f03-a859-3d5752a6758b.exe"C:\Users\Admin\AppData\Local\Temp\77249ee6-ec0e-4f03-a859-3d5752a6758b.exe"2⤵
- Executes dropped EXE
PID:2496
-
Network
-
Remote address:8.8.8.8:53Requestgist.githubusercontent.comIN AResponsegist.githubusercontent.comIN A185.199.108.133gist.githubusercontent.comIN A185.199.109.133gist.githubusercontent.comIN A185.199.110.133gist.githubusercontent.comIN A185.199.111.133
-
GEThttps://gist.githubusercontent.com/viewerboss/23497da5f0dbbb90f1fb227e8228050e/raw/con.txt1216487a086dc8449101bc30b96162aa.exeRemote address:185.199.108.133:443RequestGET /viewerboss/23497da5f0dbbb90f1fb227e8228050e/raw/con.txt HTTP/1.1
Host: gist.githubusercontent.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Length: 20
Cache-Control: max-age=300
Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Type: text/plain; charset=utf-8
ETag: "c26ac6ea0c9b0063a6441c892e8ae4f9d4302c6c855b314a14971addcd4dc652"
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
X-Frame-Options: deny
X-XSS-Protection: 1; mode=block
X-GitHub-Request-Id: 424A:13E98D:E37A66:EC58A4:6581AA90
Accept-Ranges: bytes
Date: Tue, 19 Dec 2023 14:37:05 GMT
Via: 1.1 varnish
X-Served-By: cache-lhr7324-LHR
X-Cache: MISS
X-Cache-Hits: 0
X-Timer: S1702996625.066580,VS0,VE168
Vary: Authorization,Accept-Encoding,Origin
Access-Control-Allow-Origin: *
Cross-Origin-Resource-Policy: cross-origin
X-Fastly-Request-ID: 162af2e2f7b385889fe79a76771828cc02d4ac36
Expires: Tue, 19 Dec 2023 14:42:05 GMT
Source-Age: 0
-
Remote address:8.8.8.8:53Requestbossdata.proIN AResponsebossdata.proIN A172.67.144.121bossdata.proIN A104.21.39.105
-
Remote address:172.67.144.121:443RequestGET /builds/main HTTP/1.1
Host: bossdata.pro
Connection: Keep-Alive
ResponseHTTP/1.1 522
Content-Type: text/plain; charset=UTF-8
Content-Length: 15
Connection: keep-alive
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=idhUIy%2BmUzVgYDnMsP4SOmYzlDnYAWmIDrx0grT3H%2F0Fn6ravqQUxBERID8mH67t64xlvWBnT1iAMxNlg2A9zi9KLP1AKU4E04Hez437BqkrFiX3LeTXMSJZjv6DDLI%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Server: cloudflare
CF-RAY: 838061ad39da6536-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:172.67.144.121:443RequestGET /builds/main HTTP/1.1
Host: bossdata.pro
ResponseHTTP/1.1 522
Content-Type: text/plain; charset=UTF-8
Content-Length: 15
Connection: keep-alive
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=6XXNru5FymxIHH4BQaaAgyt%2FhmEA7PIMcrN4XOgKEtEzRHJcgA%2BpOSp0JuIVc7T7tZl4uPJfJPDr%2BNOcRKQcRrjh2dCpeAVCstSc7dNHHTjqAlqq18gUVwYjemIDj1A%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Server: cloudflare
CF-RAY: 838062ae9c1ddd87-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:172.67.144.121:443RequestGET /builds/main HTTP/1.1
Host: bossdata.pro
ResponseHTTP/1.1 522
Content-Type: text/plain; charset=UTF-8
Content-Length: 15
Connection: keep-alive
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ARUNs60ETTnBUUNz8cR1hvhjqo88Oxx6uON%2FX%2FUEtBPc9DsuLu%2BsM4%2FxcKqMfswFjZ2lEK46cUTI2mquOUA0joqLCnxJAKJ0HayX6iYQ1ZxWVNmCRmAizFpvmNmj5AY%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Server: cloudflare
CF-RAY: 838063af8b30887f-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:172.67.144.121:443RequestGET /builds/main HTTP/1.1
Host: bossdata.pro
-
185.199.108.133:443https://gist.githubusercontent.com/viewerboss/23497da5f0dbbb90f1fb227e8228050e/raw/con.txttls, http1216487a086dc8449101bc30b96162aa.exe933 B 5.2kB 9 12
HTTP Request
GET https://gist.githubusercontent.com/viewerboss/23497da5f0dbbb90f1fb227e8228050e/raw/con.txtHTTP Response
200 -
823 B 6.0kB 9 10
HTTP Request
GET https://bossdata.pro/builds/mainHTTP Response
522 -
839 B 6.0kB 9 10
HTTP Request
GET https://bossdata.pro/builds/mainHTTP Response
522 -
839 B 6.0kB 9 10
HTTP Request
GET https://bossdata.pro/builds/mainHTTP Response
522 -
540 B 339 B 4 4
HTTP Request
GET https://bossdata.pro/builds/main
-
72 B 136 B 1 1
DNS Request
gist.githubusercontent.com
DNS Response
185.199.108.133185.199.109.133185.199.110.133185.199.111.133
-
58 B 90 B 1 1
DNS Request
bossdata.pro
DNS Response
172.67.144.121104.21.39.105
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f80fa38d37eb2d1d1d3aec66003b5780
SHA1fd5e87fe12df96def7ec3823744c063ecbcf653d
SHA256eec418db69eab627d827a3d1b416ab5960af88ccde836a139f9c9c11d5556f55
SHA5123c1b9cf19759e80427cd81c53558f031ec0f404fdedf984f7a6635fadb64451a7a59ae4de16a41e4f508541c15e2a7dffcd65eb09cbc3eec442783e5d5a955d9