Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 20:31
Behavioral task
behavioral1
Sample
49b0d888e217f8b200bf84c5d30d0526.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49b0d888e217f8b200bf84c5d30d0526.exe
Resource
win10v2004-20231215-en
General
-
Target
49b0d888e217f8b200bf84c5d30d0526.exe
-
Size
3.2MB
-
MD5
49b0d888e217f8b200bf84c5d30d0526
-
SHA1
d799c267d0e9e3ca69a5ef03c9f870bddd538b3c
-
SHA256
b1125bd83f5c098f10321f008362a5737e2bcf0fffa1bdfa9b3b6e297f94432d
-
SHA512
2e79c7851aa871b67e751582e00f1fcd2e54ee961fc91de99e1e88e5da7d007a16fa80924fe9240452fe7633a140f8ae6200729e6a49636341325c1526dc6d3c
-
SSDEEP
98304:DvZQ+WdSExVcakchS87ccakc5J1at2QucakchS87ccakcO:Dq7dSgdlhS87cdl5JskTdlhS87cdlO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2216 49b0d888e217f8b200bf84c5d30d0526.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 49b0d888e217f8b200bf84c5d30d0526.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 49b0d888e217f8b200bf84c5d30d0526.exe -
resource yara_rule behavioral1/memory/2148-1-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001224e-11.dat upx behavioral1/files/0x000a00000001224e-17.dat upx behavioral1/memory/2148-16-0x00000000234E0000-0x000000002373C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 49b0d888e217f8b200bf84c5d30d0526.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2148 49b0d888e217f8b200bf84c5d30d0526.exe 2216 49b0d888e217f8b200bf84c5d30d0526.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2216 2148 49b0d888e217f8b200bf84c5d30d0526.exe 17 PID 2148 wrote to memory of 2216 2148 49b0d888e217f8b200bf84c5d30d0526.exe 17 PID 2148 wrote to memory of 2216 2148 49b0d888e217f8b200bf84c5d30d0526.exe 17 PID 2148 wrote to memory of 2216 2148 49b0d888e217f8b200bf84c5d30d0526.exe 17 PID 2216 wrote to memory of 2756 2216 49b0d888e217f8b200bf84c5d30d0526.exe 21 PID 2216 wrote to memory of 2756 2216 49b0d888e217f8b200bf84c5d30d0526.exe 21 PID 2216 wrote to memory of 2756 2216 49b0d888e217f8b200bf84c5d30d0526.exe 21 PID 2216 wrote to memory of 2756 2216 49b0d888e217f8b200bf84c5d30d0526.exe 21 PID 2216 wrote to memory of 2788 2216 49b0d888e217f8b200bf84c5d30d0526.exe 24 PID 2216 wrote to memory of 2788 2216 49b0d888e217f8b200bf84c5d30d0526.exe 24 PID 2216 wrote to memory of 2788 2216 49b0d888e217f8b200bf84c5d30d0526.exe 24 PID 2216 wrote to memory of 2788 2216 49b0d888e217f8b200bf84c5d30d0526.exe 24 PID 2788 wrote to memory of 2728 2788 cmd.exe 22 PID 2788 wrote to memory of 2728 2788 cmd.exe 22 PID 2788 wrote to memory of 2728 2788 cmd.exe 22 PID 2788 wrote to memory of 2728 2788 cmd.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exeC:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe" /TN U5Z8sQiHf24d /F2⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\SW59y8T7.xml2⤵
- Suspicious use of WriteProcessMemory
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe"C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2148
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN U5Z8sQiHf24d1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD58f4ce6a338af9b414841cabf26429504
SHA1558710739150b7dfb420b9027786f0714f3ff166
SHA2561b89792d1089962cb74a70bc16e43ea0f5e205c574c3470cd23379c531090eff
SHA5127e1a4604984c381d06c17feb5179ae388f1d80a44b8992c61f1005835fcfae847b089b12aca2556dcd3e6ea553b49e576381f9682b770d6fd0e538f0c3f12de5
-
Filesize
1KB
MD5fc26d6c3d470cc419af885cebe2f5385
SHA1a473e05faab92735b9b3cc55ed202d28d0470c10
SHA25640665dfb4ae4d23f7fdd09891bda18d42c9c362973ba0bff81f96f0dbd49092f
SHA512a2a11f76f68da2d13458ebefa053f05e0b0fd1a2a29fde46a585b65ee0c5d6bca794c53aed938d3cd524c60a23a71428878dde0bedd49e2a533e1059d9fe1c74
-
Filesize
84KB
MD593a9ebe99bf9d9d1c7df646805f6a612
SHA1336db238e30c6eeda0ac68db2cbd6419214f1a41
SHA256fd1be0e50f60eebdaa991f29ee6b1afda0a881313692c24cbf8843620aef805b
SHA512b2a24d86098563886e593ac6334656f55a135ded477d5b6874101d332cee6b2ff383e0461344f9420b2ed2f10664e7a2460c8872c78b03e8e357fea89221094a