Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:22
Behavioral task
behavioral1
Sample
d90955c46267e61be233e7fd253d3b0b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d90955c46267e61be233e7fd253d3b0b.exe
Resource
win10v2004-20231215-en
General
-
Target
d90955c46267e61be233e7fd253d3b0b.exe
-
Size
1.6MB
-
MD5
d90955c46267e61be233e7fd253d3b0b
-
SHA1
c115d8d6e01ae7e5a9e173d108e0b8ed49acc941
-
SHA256
d5b612244207396bc14b3a437810988543df34ee7f1667653e121cedbd3a049a
-
SHA512
9b34144cce246d3226fe302e494e55e4947f99cad634a5fe583313cae4fd577c0decdac48f35b7c9a329cd6434495bda6dab20e7f5ace004fb27a648663a67e5
-
SSDEEP
49152:3dlf8kG3P15cakLz0VIhDbbL3azRFNS48wnJWTocakLz0O:3dd8R3P15cakcVIhDbbL3azRFNS48wng
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1768 d90955c46267e61be233e7fd253d3b0b.exe -
Executes dropped EXE 1 IoCs
pid Process 1768 d90955c46267e61be233e7fd253d3b0b.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 d90955c46267e61be233e7fd253d3b0b.exe -
resource yara_rule behavioral1/memory/2216-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000015cfa-11.dat upx behavioral1/files/0x000b000000015cfa-15.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 d90955c46267e61be233e7fd253d3b0b.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 d90955c46267e61be233e7fd253d3b0b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 d90955c46267e61be233e7fd253d3b0b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 d90955c46267e61be233e7fd253d3b0b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2216 d90955c46267e61be233e7fd253d3b0b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2216 d90955c46267e61be233e7fd253d3b0b.exe 1768 d90955c46267e61be233e7fd253d3b0b.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1768 2216 d90955c46267e61be233e7fd253d3b0b.exe 29 PID 2216 wrote to memory of 1768 2216 d90955c46267e61be233e7fd253d3b0b.exe 29 PID 2216 wrote to memory of 1768 2216 d90955c46267e61be233e7fd253d3b0b.exe 29 PID 2216 wrote to memory of 1768 2216 d90955c46267e61be233e7fd253d3b0b.exe 29 PID 1768 wrote to memory of 2592 1768 d90955c46267e61be233e7fd253d3b0b.exe 30 PID 1768 wrote to memory of 2592 1768 d90955c46267e61be233e7fd253d3b0b.exe 30 PID 1768 wrote to memory of 2592 1768 d90955c46267e61be233e7fd253d3b0b.exe 30 PID 1768 wrote to memory of 2592 1768 d90955c46267e61be233e7fd253d3b0b.exe 30 PID 1768 wrote to memory of 2664 1768 d90955c46267e61be233e7fd253d3b0b.exe 34 PID 1768 wrote to memory of 2664 1768 d90955c46267e61be233e7fd253d3b0b.exe 34 PID 1768 wrote to memory of 2664 1768 d90955c46267e61be233e7fd253d3b0b.exe 34 PID 1768 wrote to memory of 2664 1768 d90955c46267e61be233e7fd253d3b0b.exe 34 PID 2664 wrote to memory of 2852 2664 cmd.exe 33 PID 2664 wrote to memory of 2852 2664 cmd.exe 33 PID 2664 wrote to memory of 2852 2664 cmd.exe 33 PID 2664 wrote to memory of 2852 2664 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d90955c46267e61be233e7fd253d3b0b.exe"C:\Users\Admin\AppData\Local\Temp\d90955c46267e61be233e7fd253d3b0b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\d90955c46267e61be233e7fd253d3b0b.exeC:\Users\Admin\AppData\Local\Temp\d90955c46267e61be233e7fd253d3b0b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d90955c46267e61be233e7fd253d3b0b.exe" /TN qm2lmOfce5f6 /F3⤵
- Creates scheduled task(s)
PID:2592
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\xEr7s.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2664
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5eb5f395a671353970a82f0601f05d7da
SHA172ba7dd212ac4ef730e937baa3a1829b34da3131
SHA2569d7b10b1310bd633c3374602faec5044a14777d3d57e0ac5be99bd805922cb1b
SHA512344de2d31df23b1d4acbc2ac933ef35d451780d9ecde80a6acb62dd94b9bc6869b86ad5c051e9ac9286a0a508af036c3d9fe9b0639959a4f89eed9799c2f6638
-
Filesize
1KB
MD5577f92f280423847a8a86a84baead167
SHA17b748f9a9bc529c84fdfb7b44e66f9d7a9586a41
SHA2569554686e01f5590578b251cc31fdee0e4f56b505c99f51a0af156f8ca68267f8
SHA512b231b3d90766874db60e7df37fec7fea474c14595e5580b6df7792fb676624ccb2c6a002a80c6acdca483a15a5a15a5123ca945b690bbb7f0f08fb8eb5ab903e
-
Filesize
391KB
MD5233a4b4e3a37591de7cc662b0733902d
SHA199af8ec1a3df4f37b706de37dae2500cd6ce4f2c
SHA256a7e76d1af90c6888463630c359a2c824c22dd9bbd4c7d807fbd49d17f0e1381e
SHA512371658dee04bf7ddee3fad8bbc149e18d6d54d74ca4aba8394666cfba9a8b4956fb8d4eb8ef1869b2f649601e8478409bae56ac15bdc1b8f3314f490a6b46174