Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:11
Behavioral task
behavioral1
Sample
1311cd91121172d0af75be0e9454f2cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1311cd91121172d0af75be0e9454f2cc.exe
Resource
win10v2004-20231215-en
General
-
Target
1311cd91121172d0af75be0e9454f2cc.exe
-
Size
6.4MB
-
MD5
1311cd91121172d0af75be0e9454f2cc
-
SHA1
a75da7fb1471ec472828638a6929430e83dc143d
-
SHA256
751525316f4d0dfc3dd90b4f5941010471de7ae260a62dec11fdec7809a00e1e
-
SHA512
5836ab7f136edf946844beb8f3d456f2d678081678d5bb1d9950c826fc3a35cd6a0a0371cdd91ef7966930ed4555b0a88658357da36dc97404a234d27c9078b0
-
SSDEEP
196608:ywFAkK1ddlQq/BdlxX40dlQq/BdleRR1PfdlQq/BdlxX40dlQq/BdlO:lK1Sq//X4q/Ygq//X4q/w
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3552 1311cd91121172d0af75be0e9454f2cc.exe -
Executes dropped EXE 1 IoCs
pid Process 3552 1311cd91121172d0af75be0e9454f2cc.exe -
resource yara_rule behavioral2/memory/1872-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x00080000000231d9-12.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2284 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1872 1311cd91121172d0af75be0e9454f2cc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1872 1311cd91121172d0af75be0e9454f2cc.exe 3552 1311cd91121172d0af75be0e9454f2cc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1872 wrote to memory of 3552 1872 1311cd91121172d0af75be0e9454f2cc.exe 20 PID 1872 wrote to memory of 3552 1872 1311cd91121172d0af75be0e9454f2cc.exe 20 PID 1872 wrote to memory of 3552 1872 1311cd91121172d0af75be0e9454f2cc.exe 20 PID 3552 wrote to memory of 2284 3552 1311cd91121172d0af75be0e9454f2cc.exe 22 PID 3552 wrote to memory of 2284 3552 1311cd91121172d0af75be0e9454f2cc.exe 22 PID 3552 wrote to memory of 2284 3552 1311cd91121172d0af75be0e9454f2cc.exe 22 PID 3552 wrote to memory of 4392 3552 1311cd91121172d0af75be0e9454f2cc.exe 28 PID 3552 wrote to memory of 4392 3552 1311cd91121172d0af75be0e9454f2cc.exe 28 PID 3552 wrote to memory of 4392 3552 1311cd91121172d0af75be0e9454f2cc.exe 28 PID 4392 wrote to memory of 336 4392 cmd.exe 108 PID 4392 wrote to memory of 336 4392 cmd.exe 108 PID 4392 wrote to memory of 336 4392 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\1311cd91121172d0af75be0e9454f2cc.exe"C:\Users\Admin\AppData\Local\Temp\1311cd91121172d0af75be0e9454f2cc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\1311cd91121172d0af75be0e9454f2cc.exeC:\Users\Admin\AppData\Local\Temp\1311cd91121172d0af75be0e9454f2cc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1311cd91121172d0af75be0e9454f2cc.exe" /TN 1WOV8tOcae1c /F3⤵
- Creates scheduled task(s)
PID:2284
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 1WOV8tOcae1c > C:\Users\Admin\AppData\Local\Temp\mchmb2.xml3⤵
- Suspicious use of WriteProcessMemory
PID:4392
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 1WOV8tOcae1c1⤵PID:336
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5bbddb7f1af5ff6498ea58ac0bcb3b669
SHA182ec0921e4ccc4d1450366bc81b4b2cadc028bfd
SHA25610397b357bbc240e3a9fe7c1a5db3bfe5bf29c91887c52d40c8cf2a7e7e745ca
SHA512676ddd14a86c6cd948e617e9044c100a3f9746b71000ef0ae64f8719f116640fbed1567c2708f283efd76f39dd967b0f2ec47e48a880a654cc1e1940c7bcc32c