Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:58
Behavioral task
behavioral1
Sample
d0d4a391b678c0629a2f8d6deb1bbbdf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d0d4a391b678c0629a2f8d6deb1bbbdf.exe
Resource
win10v2004-20231215-en
General
-
Target
d0d4a391b678c0629a2f8d6deb1bbbdf.exe
-
Size
2.9MB
-
MD5
d0d4a391b678c0629a2f8d6deb1bbbdf
-
SHA1
82b7e8fcf6f0496d6261cfeedef933308b286a71
-
SHA256
ab80b7b02bbf467e2edf66ee4b3bdcb9265b488759b1ee522ac346c492575455
-
SHA512
9297d3bfcfb3ad6fa57e18a0e113ff009ce55e865d9d647556a89da7ca92f9169c16d5d800579e8cca99fe45fe6b70028cfb7269da44fd1504dbfca6e4d00b49
-
SSDEEP
49152:ks3dkDplk9LTwQLyhWveB+4goGQ7ai7D3xTgOxYwpKJkIx2AGGLnnz6lyjnFfZTp:F3dkDplk9LTwr4ve44goD2i7D3xkOxYv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe -
Loads dropped DLL 1 IoCs
pid Process 1300 d0d4a391b678c0629a2f8d6deb1bbbdf.exe -
resource yara_rule behavioral1/memory/1300-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012251-11.dat upx behavioral1/files/0x000b000000012251-17.dat upx behavioral1/memory/1300-16-0x0000000023490000-0x00000000236EC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 d0d4a391b678c0629a2f8d6deb1bbbdf.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 d0d4a391b678c0629a2f8d6deb1bbbdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 d0d4a391b678c0629a2f8d6deb1bbbdf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 d0d4a391b678c0629a2f8d6deb1bbbdf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1300 d0d4a391b678c0629a2f8d6deb1bbbdf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1300 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2476 1300 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 18 PID 1300 wrote to memory of 2476 1300 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 18 PID 1300 wrote to memory of 2476 1300 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 18 PID 1300 wrote to memory of 2476 1300 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 18 PID 2476 wrote to memory of 2804 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 22 PID 2476 wrote to memory of 2804 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 22 PID 2476 wrote to memory of 2804 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 22 PID 2476 wrote to memory of 2804 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 22 PID 2476 wrote to memory of 2852 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 26 PID 2476 wrote to memory of 2852 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 26 PID 2476 wrote to memory of 2852 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 26 PID 2476 wrote to memory of 2852 2476 d0d4a391b678c0629a2f8d6deb1bbbdf.exe 26 PID 2852 wrote to memory of 2704 2852 cmd.exe 24 PID 2852 wrote to memory of 2704 2852 cmd.exe 24 PID 2852 wrote to memory of 2704 2852 cmd.exe 24 PID 2852 wrote to memory of 2704 2852 cmd.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0d4a391b678c0629a2f8d6deb1bbbdf.exe"C:\Users\Admin\AppData\Local\Temp\d0d4a391b678c0629a2f8d6deb1bbbdf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\d0d4a391b678c0629a2f8d6deb1bbbdf.exeC:\Users\Admin\AppData\Local\Temp\d0d4a391b678c0629a2f8d6deb1bbbdf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d0d4a391b678c0629a2f8d6deb1bbbdf.exe" /TN U5Z8sQiHf24d /F3⤵
- Creates scheduled task(s)
PID:2804
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\DWcES4a3.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2852
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN U5Z8sQiHf24d1⤵PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d263c281814757b6b33cec4baf8a712d
SHA1caee468fdc54bf5a3c8b153e245bafa518c1fe8a
SHA256bedeb78e74a640db14d457b491f33a21e130f2675e3febdabe0b227e094923c6
SHA512ef42eb8f21ff21bb3d517ff80729f176c4e4b9b2020d0e17c9ab3281a12104a13ca42fdd0709a1eef64a14ae035f058ffce0a80a94076c5370721ac23fd0c4f4
-
Filesize
10KB
MD5a1259c122e2106705906927ef51309f5
SHA172c951147fc0098603303667aef69bde8cafb76d
SHA2567b21f73b060852fb333db92a86ff7ba4194f8ac2935f6aa807a2fbd818b7861f
SHA51233b27dc771351da7824221e63a39fafcf369296f3131c6af4999db7b4af4c187399191276c7c325d447dc6a46a753e083add0272b512a7f533bbb7fce3ceba8a
-
Filesize
109KB
MD5372d0137568e4f11ed4d3910591a7a18
SHA1e654fea9ef57836973c0d4e7cb346df48f32e34d
SHA256f4a987a725da952c23f55abacea349415ddd8bfd6b48c5f78f56f2aea192ca26
SHA512e148dcab819c5f141600cf487e07e2bda066195f82b403a5530d8545a994edb5c6397d45e6f8caad1482382d31ed0afa87c3e2fd942ecd42253995d6166bac24