Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:51
Behavioral task
behavioral1
Sample
af84772f95f77ec47a16dc474fdb9ad4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
af84772f95f77ec47a16dc474fdb9ad4.exe
Resource
win10v2004-20231222-en
General
-
Target
af84772f95f77ec47a16dc474fdb9ad4.exe
-
Size
1.6MB
-
MD5
af84772f95f77ec47a16dc474fdb9ad4
-
SHA1
02b7ce483f0e8b44be2f65bcc0cdc1859832c4d0
-
SHA256
eeb381d77c62785ed61b08ee1172fc2ddb73504259ea4caa1a10df82ffb4fb76
-
SHA512
6d6ad426534611157dc45c2f546744c3dfd566ef08e7176b3d7b133970c2d21fce4d05fc60e1d8803973c7c51efcb6c2d0a7a5c69c0ec6d7b357d7ecb10bb03d
-
SSDEEP
49152:kjeVzRZHcakLz0omv7XeFKWD4baxacLcakLz0O:kjKzRZHcakcomv7X0D4baxa8cakcO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 af84772f95f77ec47a16dc474fdb9ad4.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 af84772f95f77ec47a16dc474fdb9ad4.exe -
Loads dropped DLL 1 IoCs
pid Process 1172 af84772f95f77ec47a16dc474fdb9ad4.exe -
resource yara_rule behavioral1/memory/1172-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012261-11.dat upx behavioral1/memory/1172-16-0x0000000023030000-0x000000002328C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2980 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 af84772f95f77ec47a16dc474fdb9ad4.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 af84772f95f77ec47a16dc474fdb9ad4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 af84772f95f77ec47a16dc474fdb9ad4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 af84772f95f77ec47a16dc474fdb9ad4.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1172 af84772f95f77ec47a16dc474fdb9ad4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1172 af84772f95f77ec47a16dc474fdb9ad4.exe 2392 af84772f95f77ec47a16dc474fdb9ad4.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1172 wrote to memory of 2392 1172 af84772f95f77ec47a16dc474fdb9ad4.exe 29 PID 1172 wrote to memory of 2392 1172 af84772f95f77ec47a16dc474fdb9ad4.exe 29 PID 1172 wrote to memory of 2392 1172 af84772f95f77ec47a16dc474fdb9ad4.exe 29 PID 1172 wrote to memory of 2392 1172 af84772f95f77ec47a16dc474fdb9ad4.exe 29 PID 2392 wrote to memory of 2980 2392 af84772f95f77ec47a16dc474fdb9ad4.exe 30 PID 2392 wrote to memory of 2980 2392 af84772f95f77ec47a16dc474fdb9ad4.exe 30 PID 2392 wrote to memory of 2980 2392 af84772f95f77ec47a16dc474fdb9ad4.exe 30 PID 2392 wrote to memory of 2980 2392 af84772f95f77ec47a16dc474fdb9ad4.exe 30 PID 2392 wrote to memory of 2168 2392 af84772f95f77ec47a16dc474fdb9ad4.exe 33 PID 2392 wrote to memory of 2168 2392 af84772f95f77ec47a16dc474fdb9ad4.exe 33 PID 2392 wrote to memory of 2168 2392 af84772f95f77ec47a16dc474fdb9ad4.exe 33 PID 2392 wrote to memory of 2168 2392 af84772f95f77ec47a16dc474fdb9ad4.exe 33 PID 2168 wrote to memory of 2692 2168 cmd.exe 34 PID 2168 wrote to memory of 2692 2168 cmd.exe 34 PID 2168 wrote to memory of 2692 2168 cmd.exe 34 PID 2168 wrote to memory of 2692 2168 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\af84772f95f77ec47a16dc474fdb9ad4.exe"C:\Users\Admin\AppData\Local\Temp\af84772f95f77ec47a16dc474fdb9ad4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\af84772f95f77ec47a16dc474fdb9ad4.exeC:\Users\Admin\AppData\Local\Temp\af84772f95f77ec47a16dc474fdb9ad4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\af84772f95f77ec47a16dc474fdb9ad4.exe" /TN WAgLRKqP8c0d /F3⤵
- Creates scheduled task(s)
PID:2980
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN WAgLRKqP8c0d > C:\Users\Admin\AppData\Local\Temp\uQuAtBfsQ.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN WAgLRKqP8c0d4⤵PID:2692
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f2c5ff31054f8e0534f590efbd792649
SHA1cc4058ca5635882814d9cfe7818219ed376ae24e
SHA25628e9a4aa4f4442e39c5cb09bd164d6502f2594ab228ab71d799e99cbc5cbcb9d
SHA512b6558d3b93efd6dbb38c10f087161d02e9e7e1f78bdf4403676d8fbb3f63145958b22f4b4d7dbb88d477150a33a0b1370994ab66f2c2d294cb6a6780bfc2226a
-
Filesize
1.6MB
MD57cd7ca47e219207bbbcd08b1efd86692
SHA1b2c7271ccb07cfbc1b71e6915c9ee8b2ca339d35
SHA256f592ba73410fd6257eaba88062bcb7fce8b7d1a290e74fd71c83c68acbf19b9f
SHA512c2d7315f4bc7319375bc18a0faca8caf7fda359b5d985ac3f7ceff296caeea9ae8a851d8bb2d153333526a3fd0eb882bcd4e3de8efe2af0fda156578ecf36ebb