Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:01
Behavioral task
behavioral1
Sample
b4cb24e6c6eb245a30378fb56c54fc36.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b4cb24e6c6eb245a30378fb56c54fc36.exe
Resource
win10v2004-20231215-en
General
-
Target
b4cb24e6c6eb245a30378fb56c54fc36.exe
-
Size
1.6MB
-
MD5
b4cb24e6c6eb245a30378fb56c54fc36
-
SHA1
efad66aa2f384000cca48149464f79ed663bace1
-
SHA256
8529e083a9c52a9b1fd1b65c08d3c53e770c8c435a870920745077269420f4cd
-
SHA512
30d44d10ca6b062a873ecc3678ac40550d7f6a094d1011a3c856fac27911ed39f1d141a0d5ed15dc0f246a874b9a2cb207ed3f6f7179d976001814c2af614f52
-
SSDEEP
49152:ZnyBFrBdPu9ybqFgGjcakLz0XWzJy581Sa3cakLz0O:UBFrBdPu9ybGXjcakcmzU581lcakcO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe -
Loads dropped DLL 1 IoCs
pid Process 2304 b4cb24e6c6eb245a30378fb56c54fc36.exe -
resource yara_rule behavioral1/memory/2304-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b00000001223f-11.dat upx behavioral1/files/0x000b00000001223f-13.dat upx behavioral1/files/0x000b00000001223f-15.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1984 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 b4cb24e6c6eb245a30378fb56c54fc36.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 b4cb24e6c6eb245a30378fb56c54fc36.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 b4cb24e6c6eb245a30378fb56c54fc36.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 b4cb24e6c6eb245a30378fb56c54fc36.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2304 b4cb24e6c6eb245a30378fb56c54fc36.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2304 b4cb24e6c6eb245a30378fb56c54fc36.exe 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2820 2304 b4cb24e6c6eb245a30378fb56c54fc36.exe 29 PID 2304 wrote to memory of 2820 2304 b4cb24e6c6eb245a30378fb56c54fc36.exe 29 PID 2304 wrote to memory of 2820 2304 b4cb24e6c6eb245a30378fb56c54fc36.exe 29 PID 2304 wrote to memory of 2820 2304 b4cb24e6c6eb245a30378fb56c54fc36.exe 29 PID 2820 wrote to memory of 1984 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe 30 PID 2820 wrote to memory of 1984 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe 30 PID 2820 wrote to memory of 1984 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe 30 PID 2820 wrote to memory of 1984 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe 30 PID 2820 wrote to memory of 2852 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe 33 PID 2820 wrote to memory of 2852 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe 33 PID 2820 wrote to memory of 2852 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe 33 PID 2820 wrote to memory of 2852 2820 b4cb24e6c6eb245a30378fb56c54fc36.exe 33 PID 2852 wrote to memory of 2776 2852 cmd.exe 34 PID 2852 wrote to memory of 2776 2852 cmd.exe 34 PID 2852 wrote to memory of 2776 2852 cmd.exe 34 PID 2852 wrote to memory of 2776 2852 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4cb24e6c6eb245a30378fb56c54fc36.exe"C:\Users\Admin\AppData\Local\Temp\b4cb24e6c6eb245a30378fb56c54fc36.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\b4cb24e6c6eb245a30378fb56c54fc36.exeC:\Users\Admin\AppData\Local\Temp\b4cb24e6c6eb245a30378fb56c54fc36.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b4cb24e6c6eb245a30378fb56c54fc36.exe" /TN uhTCmbCqd877 /F3⤵
- Creates scheduled task(s)
PID:1984
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uhTCmbCqd877 > C:\Users\Admin\AppData\Local\Temp\6dJtM.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uhTCmbCqd8774⤵PID:2776
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD59cb97cda518a41a5acf48cb04a37867a
SHA1b5a05d2000e739584980c7fcf1983fde273c4237
SHA256b9c2d151adf0d21b78fc6dcbb711d394eb4610ce792a1295513123d00d10b954
SHA5128fde0eeccf1db1cd35de8d5be81d478b8d95baf1565c008e14157bab2174e6c4c1aa6a91f4eddb45fda449b6f2a10cb85d4f49fca8701e9b229061b92a0dd2e0
-
Filesize
303KB
MD5924c3c8621473e1863cf6242ed0d68d2
SHA130c872a18c6caf15eafe06a89f3ea65938901f8d
SHA256e206c15bbd4510f47025dccb2bd5e7920317eaa1d600bdcde2260af3be30d8bc
SHA512fe9a8e148ed4a5df5656c492a7b3db645d0d916d44c5c533cfacaedf77db3a62c191fb11904a8cdd64b81c62ef93c4e6be542a11c812f7c414ade1592d183966
-
Filesize
331KB
MD5cbd37657d8d538d2427cf083c6f4a40d
SHA11d3c5226f5167c256a8acbfea80105785e4fa130
SHA2568b69d553bea8e57dfc4911ff311722a4587a19c27f7773460d8595085ec14688
SHA51296aa499a46fd99eeb55b8458f057d443388bee8cf9943706bf79bf4568353e67409ae3f94395e5957099121c84b37873695bca17e67880eee7a15fce5840577a