Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:56
Behavioral task
behavioral1
Sample
cff9c5583d8bbc0aba328311488a291a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cff9c5583d8bbc0aba328311488a291a.exe
Resource
win10v2004-20231215-en
General
-
Target
cff9c5583d8bbc0aba328311488a291a.exe
-
Size
10.2MB
-
MD5
cff9c5583d8bbc0aba328311488a291a
-
SHA1
48271eafab43f8d3ab2dc6b63ea3b7740f27325b
-
SHA256
09199eb8f479720d93c37d66a408336fe7cefb9fe22bfc5171dde0acb1fbedee
-
SHA512
48e8a87bf83f2a0476c4b902da394ffbb8c3c245134e1ee7b0d22439b0430e1179c8154b02f8a6e43e92abe9a59b39a00c45eb822f972db9ef1e7c9b8b506c61
-
SSDEEP
196608:dzd3P02HeHXYi5FWZ2dFKR3jmTHOQyi5FWZ2dFK:r3EYiT82Ujau1iT82
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2644 cff9c5583d8bbc0aba328311488a291a.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 cff9c5583d8bbc0aba328311488a291a.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 cff9c5583d8bbc0aba328311488a291a.exe -
resource yara_rule behavioral1/memory/2640-1-0x0000000000400000-0x0000000000D9E000-memory.dmp upx behavioral1/files/0x0009000000012281-11.dat upx behavioral1/memory/2640-16-0x0000000004CB0000-0x000000000564E000-memory.dmp upx behavioral1/files/0x0009000000012281-14.dat upx behavioral1/memory/2644-18-0x0000000000400000-0x0000000000D9E000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 cff9c5583d8bbc0aba328311488a291a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 cff9c5583d8bbc0aba328311488a291a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2640 cff9c5583d8bbc0aba328311488a291a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2640 cff9c5583d8bbc0aba328311488a291a.exe 2644 cff9c5583d8bbc0aba328311488a291a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2644 2640 cff9c5583d8bbc0aba328311488a291a.exe 28 PID 2640 wrote to memory of 2644 2640 cff9c5583d8bbc0aba328311488a291a.exe 28 PID 2640 wrote to memory of 2644 2640 cff9c5583d8bbc0aba328311488a291a.exe 28 PID 2640 wrote to memory of 2644 2640 cff9c5583d8bbc0aba328311488a291a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cff9c5583d8bbc0aba328311488a291a.exe"C:\Users\Admin\AppData\Local\Temp\cff9c5583d8bbc0aba328311488a291a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\cff9c5583d8bbc0aba328311488a291a.exeC:\Users\Admin\AppData\Local\Temp\cff9c5583d8bbc0aba328311488a291a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5664992b6c60da90a3cddc93ea7c1575c
SHA1976c8116457ad1cb5b2de47418366f30247ae679
SHA2564371317f686f3d8acbf178b81373459f8aca0504fadfd5c15962375e1a63fac7
SHA512212614f6f29cac9567196eb213b409745492f27877decc09d2ed47158b83d19bf1d191be3c604b38f64a46bad8504a412c0542d4ad6859d4e33067392d615298
-
Filesize
196KB
MD5a66e76b113f96b0a2c66c50775b507a9
SHA141fd948e1eec1b782d791f00493ef761669fed33
SHA256618ead07234d84758cb6863c9494612a350bdee437c91339de260f3d2f2ec0f2
SHA5123e0bb5557931f98e021ebd5669477f21e73bed8d2948d832949f5f72dbaec5d007b3a9ec253df57943a2761269eb017ce725b47b047ae0cd67ae2313c61bff2c