Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:07
Behavioral task
behavioral1
Sample
1301bac0ed7f020e5044c7341e59f34f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1301bac0ed7f020e5044c7341e59f34f.exe
Resource
win10v2004-20231215-en
General
-
Target
1301bac0ed7f020e5044c7341e59f34f.exe
-
Size
2.0MB
-
MD5
1301bac0ed7f020e5044c7341e59f34f
-
SHA1
c560e6379a54f97bfa998d35768f4b1590e89911
-
SHA256
13e1ef5ece68a28800bc6fc7a7b0d66e49e678619a7957be489317d88418b54e
-
SHA512
3402b7896bc13435a9c47b2308c6fab11f7ac500a267c8483d39807974e338a24b4a638e5b880f986a2b0b18cac275a6d4b5e81f9b47d33f62793f29120d415d
-
SSDEEP
49152:69Sn4UwdOjIjAqW6OHESEIwkID1mhi9wYIjAqW6OH:69Sn4UwdOjIjAqWl1EIwkIBmhi6YIjAF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2152 1301bac0ed7f020e5044c7341e59f34f.exe -
Executes dropped EXE 1 IoCs
pid Process 2152 1301bac0ed7f020e5044c7341e59f34f.exe -
Loads dropped DLL 1 IoCs
pid Process 2940 1301bac0ed7f020e5044c7341e59f34f.exe -
resource yara_rule behavioral1/memory/2940-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2940-16-0x0000000023230000-0x000000002348C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2548 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2940 1301bac0ed7f020e5044c7341e59f34f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2940 1301bac0ed7f020e5044c7341e59f34f.exe 2152 1301bac0ed7f020e5044c7341e59f34f.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2152 2940 1301bac0ed7f020e5044c7341e59f34f.exe 22 PID 2940 wrote to memory of 2152 2940 1301bac0ed7f020e5044c7341e59f34f.exe 22 PID 2940 wrote to memory of 2152 2940 1301bac0ed7f020e5044c7341e59f34f.exe 22 PID 2940 wrote to memory of 2152 2940 1301bac0ed7f020e5044c7341e59f34f.exe 22 PID 2152 wrote to memory of 2548 2152 1301bac0ed7f020e5044c7341e59f34f.exe 18 PID 2152 wrote to memory of 2548 2152 1301bac0ed7f020e5044c7341e59f34f.exe 18 PID 2152 wrote to memory of 2548 2152 1301bac0ed7f020e5044c7341e59f34f.exe 18 PID 2152 wrote to memory of 2548 2152 1301bac0ed7f020e5044c7341e59f34f.exe 18 PID 2152 wrote to memory of 2648 2152 1301bac0ed7f020e5044c7341e59f34f.exe 21 PID 2152 wrote to memory of 2648 2152 1301bac0ed7f020e5044c7341e59f34f.exe 21 PID 2152 wrote to memory of 2648 2152 1301bac0ed7f020e5044c7341e59f34f.exe 21 PID 2152 wrote to memory of 2648 2152 1301bac0ed7f020e5044c7341e59f34f.exe 21 PID 2648 wrote to memory of 2668 2648 cmd.exe 20 PID 2648 wrote to memory of 2668 2648 cmd.exe 20 PID 2648 wrote to memory of 2668 2648 cmd.exe 20 PID 2648 wrote to memory of 2668 2648 cmd.exe 20
Processes
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exe" /TN qm2lmOfce5f6 /F1⤵
- Creates scheduled task(s)
PID:2548
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\LqoyM.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2648
-
C:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exeC:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2152
-
C:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exe"C:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2940