Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 20:49
Behavioral task
behavioral1
Sample
1c2eb85e372ea31f32a07bb0929f2928.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c2eb85e372ea31f32a07bb0929f2928.exe
Resource
win10v2004-20231215-en
General
-
Target
1c2eb85e372ea31f32a07bb0929f2928.exe
-
Size
1003KB
-
MD5
1c2eb85e372ea31f32a07bb0929f2928
-
SHA1
bce6b1d56b0c7249f1d1420955460df5946fa103
-
SHA256
f45626975f069f5f8ca8a56e15904edf39e6ba67cbaa7e965ffb40ed3f667cf0
-
SHA512
dfed7b0e372ad05a6ac63d2e485da57b183d591732e288acca418929681185130a15d167e9cb68c8db66ac0daa2d913d4f0c7efb0e3082b74671c5b30b0a3548
-
SSDEEP
24576:qIQFA2HKpcgauoksRj8YQcjukL2CDYibq6/yqLNaF:qIQFA2HKpcgarksRj8TcakLz0ibq6yqh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1152 1c2eb85e372ea31f32a07bb0929f2928.exe -
Executes dropped EXE 1 IoCs
pid Process 1152 1c2eb85e372ea31f32a07bb0929f2928.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 1c2eb85e372ea31f32a07bb0929f2928.exe -
resource yara_rule behavioral1/memory/2980-6-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000012287-11.dat upx behavioral1/memory/2980-13-0x0000000022EC0000-0x000000002311C000-memory.dmp upx behavioral1/files/0x0009000000012287-17.dat upx behavioral1/memory/1152-18-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000012287-14.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2724 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 1c2eb85e372ea31f32a07bb0929f2928.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 1c2eb85e372ea31f32a07bb0929f2928.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 1c2eb85e372ea31f32a07bb0929f2928.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 1c2eb85e372ea31f32a07bb0929f2928.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 1c2eb85e372ea31f32a07bb0929f2928.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 1c2eb85e372ea31f32a07bb0929f2928.exe 1152 1c2eb85e372ea31f32a07bb0929f2928.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1152 2980 1c2eb85e372ea31f32a07bb0929f2928.exe 29 PID 2980 wrote to memory of 1152 2980 1c2eb85e372ea31f32a07bb0929f2928.exe 29 PID 2980 wrote to memory of 1152 2980 1c2eb85e372ea31f32a07bb0929f2928.exe 29 PID 2980 wrote to memory of 1152 2980 1c2eb85e372ea31f32a07bb0929f2928.exe 29 PID 1152 wrote to memory of 2724 1152 1c2eb85e372ea31f32a07bb0929f2928.exe 30 PID 1152 wrote to memory of 2724 1152 1c2eb85e372ea31f32a07bb0929f2928.exe 30 PID 1152 wrote to memory of 2724 1152 1c2eb85e372ea31f32a07bb0929f2928.exe 30 PID 1152 wrote to memory of 2724 1152 1c2eb85e372ea31f32a07bb0929f2928.exe 30 PID 1152 wrote to memory of 2868 1152 1c2eb85e372ea31f32a07bb0929f2928.exe 32 PID 1152 wrote to memory of 2868 1152 1c2eb85e372ea31f32a07bb0929f2928.exe 32 PID 1152 wrote to memory of 2868 1152 1c2eb85e372ea31f32a07bb0929f2928.exe 32 PID 1152 wrote to memory of 2868 1152 1c2eb85e372ea31f32a07bb0929f2928.exe 32 PID 2868 wrote to memory of 2096 2868 cmd.exe 34 PID 2868 wrote to memory of 2096 2868 cmd.exe 34 PID 2868 wrote to memory of 2096 2868 cmd.exe 34 PID 2868 wrote to memory of 2096 2868 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c2eb85e372ea31f32a07bb0929f2928.exe"C:\Users\Admin\AppData\Local\Temp\1c2eb85e372ea31f32a07bb0929f2928.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\1c2eb85e372ea31f32a07bb0929f2928.exeC:\Users\Admin\AppData\Local\Temp\1c2eb85e372ea31f32a07bb0929f2928.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1c2eb85e372ea31f32a07bb0929f2928.exe" /TN m8v9k5kD0c8e /F3⤵
- Creates scheduled task(s)
PID:2724
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN m8v9k5kD0c8e > C:\Users\Admin\AppData\Local\Temp\7inTQ2ije.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN m8v9k5kD0c8e4⤵PID:2096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD551512c1d724afd5c6102fb17e4785c78
SHA1f84ce394fc95a1161e20bd75a1b40acef9ead20c
SHA256674aba9f197b51a865c8eda8a268b7fbc44fb1eaf6cdc9e4cf98345223860b7f
SHA5126fe5817c20f1705f513eeb1e9018cbd0f074cfc4023efa2d7a3714f60d4958bb7593bc2f3c94ff012d92a134a539b4d50745f6fce8c26c50d3a19e5161da1ac0
-
Filesize
486KB
MD5bc45f03d28f3bc94411e351ca09dbd34
SHA1ce6c6007aa8934cf91b0b48a155004f2b4a6ffcb
SHA2561c6e0782f62db8388e894977cf2385b406e2b8c29fd224cf5f407f5deaa1a1e6
SHA51297bf0ac1ad72e35da80877633845108f0c04e90ffe4271793997fd77c8a269eb20940f2efb58489e55dd59fecf883804fb52b5710ee2e5ba82a95f15936df616
-
Filesize
1003KB
MD50924f18c31adcc60ebfd8fcc48360834
SHA1f804145c752ac49f881e5a86561e5a0fccdcc577
SHA25606a5cc32a18287846a91d5a8ef87fe94eaf0c7adcc8a6ca9e0681c730b5609e7
SHA5129b6be580c4c876b984094f1256cd11f535d1ce640ef86243849f852c69bba70e9da48c1e8c69c5093c1ce1e49a7425ae6e6256b07c510a7f08218fb3299ec288