Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 12:14
Behavioral task
behavioral1
Sample
48f356276bf6f1ac5b12c86cf1226e54.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48f356276bf6f1ac5b12c86cf1226e54.exe
Resource
win10v2004-20231215-en
General
-
Target
48f356276bf6f1ac5b12c86cf1226e54.exe
-
Size
765KB
-
MD5
48f356276bf6f1ac5b12c86cf1226e54
-
SHA1
30e64717a276bcb70f9c0109193ae52359cbf14d
-
SHA256
5379b6a271018d79cce080175c504efaf8c5d9009f9f41db0d68ff4009a27c82
-
SHA512
79087e265864773698d06d8b011fff9d48a18fb97db2850aa20e7e199bd4ca776d1e10abc613da770a2908830dc39fc09561e4f8fce3dc32723c54484252189a
-
SSDEEP
12288:17EFoVqOFLI72340MZy5WSvogaCRsoOdyFUm4flO9dJ5IECpxOokLZsY:5T0g402nSvQoycjukL2Y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1708 48f356276bf6f1ac5b12c86cf1226e54.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 48f356276bf6f1ac5b12c86cf1226e54.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 48f356276bf6f1ac5b12c86cf1226e54.exe -
resource yara_rule behavioral1/memory/2536-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001224e-11.dat upx behavioral1/files/0x000a00000001224e-17.dat upx behavioral1/memory/2536-16-0x0000000022FE0000-0x000000002323C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 48f356276bf6f1ac5b12c86cf1226e54.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 48f356276bf6f1ac5b12c86cf1226e54.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 48f356276bf6f1ac5b12c86cf1226e54.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 48f356276bf6f1ac5b12c86cf1226e54.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2536 48f356276bf6f1ac5b12c86cf1226e54.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2536 48f356276bf6f1ac5b12c86cf1226e54.exe 1708 48f356276bf6f1ac5b12c86cf1226e54.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1708 2536 48f356276bf6f1ac5b12c86cf1226e54.exe 29 PID 2536 wrote to memory of 1708 2536 48f356276bf6f1ac5b12c86cf1226e54.exe 29 PID 2536 wrote to memory of 1708 2536 48f356276bf6f1ac5b12c86cf1226e54.exe 29 PID 2536 wrote to memory of 1708 2536 48f356276bf6f1ac5b12c86cf1226e54.exe 29 PID 1708 wrote to memory of 2764 1708 48f356276bf6f1ac5b12c86cf1226e54.exe 31 PID 1708 wrote to memory of 2764 1708 48f356276bf6f1ac5b12c86cf1226e54.exe 31 PID 1708 wrote to memory of 2764 1708 48f356276bf6f1ac5b12c86cf1226e54.exe 31 PID 1708 wrote to memory of 2764 1708 48f356276bf6f1ac5b12c86cf1226e54.exe 31 PID 1708 wrote to memory of 2792 1708 48f356276bf6f1ac5b12c86cf1226e54.exe 34 PID 1708 wrote to memory of 2792 1708 48f356276bf6f1ac5b12c86cf1226e54.exe 34 PID 1708 wrote to memory of 2792 1708 48f356276bf6f1ac5b12c86cf1226e54.exe 34 PID 1708 wrote to memory of 2792 1708 48f356276bf6f1ac5b12c86cf1226e54.exe 34 PID 2792 wrote to memory of 2732 2792 cmd.exe 32 PID 2792 wrote to memory of 2732 2792 cmd.exe 32 PID 2792 wrote to memory of 2732 2792 cmd.exe 32 PID 2792 wrote to memory of 2732 2792 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\48f356276bf6f1ac5b12c86cf1226e54.exe"C:\Users\Admin\AppData\Local\Temp\48f356276bf6f1ac5b12c86cf1226e54.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\48f356276bf6f1ac5b12c86cf1226e54.exeC:\Users\Admin\AppData\Local\Temp\48f356276bf6f1ac5b12c86cf1226e54.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\48f356276bf6f1ac5b12c86cf1226e54.exe" /TN U5Z8sQiHf24d /F3⤵
- Creates scheduled task(s)
PID:2764
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\hjZ0z1.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2792
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN U5Z8sQiHf24d1⤵PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5492e7568e4ca7f8795dc3f1e877ee788
SHA13054181dfee4058d7c1ebb0da6d505f8f9cd54f1
SHA2561bf319b7af8a84627601da3c331852473b6378d6827d2126e400407e04189e24
SHA512e1f7473adb5a6cb16114f9961fc9c7bef520627b9eea443ecee44289ac0b8c45da96218dad20c3d0a8ffba49810b4bcd2ff70adbde9ebba04da54d691112584b
-
Filesize
765KB
MD53bbdbf1e07ea73bcbae0c5e13d6037a1
SHA1d2760420c3a3c1ef9aeaaa15ceb4f56eea91b3d6
SHA256f0ff01d1fc208d5d6f7c1bdf854c6f8890d599b8777594139e1e88f2d4895e44
SHA512adbfecae0b8834e873cf391a4c5128c0d0396c8e45de3ce766157f35833cba24fa9c6dbc483f2c0f60841825c86adba3ef049ac726dba34c1243181020141990