Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 20:31

General

  • Target

    49b0d888e217f8b200bf84c5d30d0526.exe

  • Size

    3.2MB

  • MD5

    49b0d888e217f8b200bf84c5d30d0526

  • SHA1

    d799c267d0e9e3ca69a5ef03c9f870bddd538b3c

  • SHA256

    b1125bd83f5c098f10321f008362a5737e2bcf0fffa1bdfa9b3b6e297f94432d

  • SHA512

    2e79c7851aa871b67e751582e00f1fcd2e54ee961fc91de99e1e88e5da7d007a16fa80924fe9240452fe7633a140f8ae6200729e6a49636341325c1526dc6d3c

  • SSDEEP

    98304:DvZQ+WdSExVcakchS87ccakc5J1at2QucakchS87ccakcO:Dq7dSgdlhS87cdl5JskTdlhS87cdlO

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe
    C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe" /TN U5Z8sQiHf24d /F
      2⤵
      • Creates scheduled task(s)
      PID:2756
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\SW59y8T7.xml
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2788
  • C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe
    "C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2148
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /Query /XML /TN U5Z8sQiHf24d
    1⤵
      PID:2728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe

      Filesize

      59KB

      MD5

      8f4ce6a338af9b414841cabf26429504

      SHA1

      558710739150b7dfb420b9027786f0714f3ff166

      SHA256

      1b89792d1089962cb74a70bc16e43ea0f5e205c574c3470cd23379c531090eff

      SHA512

      7e1a4604984c381d06c17feb5179ae388f1d80a44b8992c61f1005835fcfae847b089b12aca2556dcd3e6ea553b49e576381f9682b770d6fd0e538f0c3f12de5

    • C:\Users\Admin\AppData\Local\Temp\SW59y8T7.xml

      Filesize

      1KB

      MD5

      fc26d6c3d470cc419af885cebe2f5385

      SHA1

      a473e05faab92735b9b3cc55ed202d28d0470c10

      SHA256

      40665dfb4ae4d23f7fdd09891bda18d42c9c362973ba0bff81f96f0dbd49092f

      SHA512

      a2a11f76f68da2d13458ebefa053f05e0b0fd1a2a29fde46a585b65ee0c5d6bca794c53aed938d3cd524c60a23a71428878dde0bedd49e2a533e1059d9fe1c74

    • \Users\Admin\AppData\Local\Temp\49b0d888e217f8b200bf84c5d30d0526.exe

      Filesize

      84KB

      MD5

      93a9ebe99bf9d9d1c7df646805f6a612

      SHA1

      336db238e30c6eeda0ac68db2cbd6419214f1a41

      SHA256

      fd1be0e50f60eebdaa991f29ee6b1afda0a881313692c24cbf8843620aef805b

      SHA512

      b2a24d86098563886e593ac6334656f55a135ded477d5b6874101d332cee6b2ff383e0461344f9420b2ed2f10664e7a2460c8872c78b03e8e357fea89221094a

    • memory/2148-16-0x00000000234E0000-0x000000002373C000-memory.dmp

      Filesize

      2.4MB

    • memory/2148-3-0x0000000022DC0000-0x0000000022E3E000-memory.dmp

      Filesize

      504KB

    • memory/2148-0-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2148-54-0x00000000234E0000-0x000000002373C000-memory.dmp

      Filesize

      2.4MB

    • memory/2148-1-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2148-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2216-27-0x0000000000330000-0x00000000003AE000-memory.dmp

      Filesize

      504KB

    • memory/2216-24-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2216-29-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/2216-25-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2216-55-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB