Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 02:18
Behavioral task
behavioral1
Sample
5537ae68764b67d0c14bed5cf2e3f646.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5537ae68764b67d0c14bed5cf2e3f646.exe
Resource
win10v2004-20231222-en
General
-
Target
5537ae68764b67d0c14bed5cf2e3f646.exe
-
Size
3.0MB
-
MD5
5537ae68764b67d0c14bed5cf2e3f646
-
SHA1
0eb2e9117fd18af0aabff0b1d43bee946e878044
-
SHA256
78b9e0050850c5a99bedd2e0a1b847976d46d18f3d8936d9e33cb517a5b35c05
-
SHA512
6949986a700878275ec43788b1119aa6bc750a8dfab2363669090012f9c3af0133ff76e01c33f4b6b876d6047ba7be0222812c5087646d94eefcd4384f51a89b
-
SSDEEP
49152:oOTFCicXbf8VmBhDcakLoY4fIKSW6TItcakL62XgNzcwO2RmBoV8cakLoY4fIKSp:1TFCJXYVmBhDcakH4fInW6McakpXgNzb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2672 5537ae68764b67d0c14bed5cf2e3f646.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 5537ae68764b67d0c14bed5cf2e3f646.exe -
Loads dropped DLL 1 IoCs
pid Process 2288 5537ae68764b67d0c14bed5cf2e3f646.exe -
resource yara_rule behavioral1/memory/2288-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012243-11.dat upx behavioral1/memory/2672-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 5537ae68764b67d0c14bed5cf2e3f646.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 5537ae68764b67d0c14bed5cf2e3f646.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 5537ae68764b67d0c14bed5cf2e3f646.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 5537ae68764b67d0c14bed5cf2e3f646.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2288 5537ae68764b67d0c14bed5cf2e3f646.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2288 5537ae68764b67d0c14bed5cf2e3f646.exe 2672 5537ae68764b67d0c14bed5cf2e3f646.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2672 2288 5537ae68764b67d0c14bed5cf2e3f646.exe 29 PID 2288 wrote to memory of 2672 2288 5537ae68764b67d0c14bed5cf2e3f646.exe 29 PID 2288 wrote to memory of 2672 2288 5537ae68764b67d0c14bed5cf2e3f646.exe 29 PID 2288 wrote to memory of 2672 2288 5537ae68764b67d0c14bed5cf2e3f646.exe 29 PID 2672 wrote to memory of 2832 2672 5537ae68764b67d0c14bed5cf2e3f646.exe 30 PID 2672 wrote to memory of 2832 2672 5537ae68764b67d0c14bed5cf2e3f646.exe 30 PID 2672 wrote to memory of 2832 2672 5537ae68764b67d0c14bed5cf2e3f646.exe 30 PID 2672 wrote to memory of 2832 2672 5537ae68764b67d0c14bed5cf2e3f646.exe 30 PID 2672 wrote to memory of 2808 2672 5537ae68764b67d0c14bed5cf2e3f646.exe 32 PID 2672 wrote to memory of 2808 2672 5537ae68764b67d0c14bed5cf2e3f646.exe 32 PID 2672 wrote to memory of 2808 2672 5537ae68764b67d0c14bed5cf2e3f646.exe 32 PID 2672 wrote to memory of 2808 2672 5537ae68764b67d0c14bed5cf2e3f646.exe 32 PID 2808 wrote to memory of 2876 2808 cmd.exe 34 PID 2808 wrote to memory of 2876 2808 cmd.exe 34 PID 2808 wrote to memory of 2876 2808 cmd.exe 34 PID 2808 wrote to memory of 2876 2808 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5537ae68764b67d0c14bed5cf2e3f646.exe"C:\Users\Admin\AppData\Local\Temp\5537ae68764b67d0c14bed5cf2e3f646.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\5537ae68764b67d0c14bed5cf2e3f646.exeC:\Users\Admin\AppData\Local\Temp\5537ae68764b67d0c14bed5cf2e3f646.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\5537ae68764b67d0c14bed5cf2e3f646.exe" /TN BSpsfata099d /F3⤵
- Creates scheduled task(s)
PID:2832
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN BSpsfata099d > C:\Users\Admin\AppData\Local\Temp\eDVefVzsY.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN BSpsfata099d4⤵PID:2876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54172ee95ab782dd9fac8124367e8261b
SHA14a2da820b9414cb51a870345f8ae07fc9296a90d
SHA2562dcfd8d22e4492db267e470a3fc77fca77b87e6d37957d276ee6882527bf3cbe
SHA51243d7289774dc776b7a2c9b30637d035b8f0a4b902bf06590a8908cc6af63a3089ce82b96480d0d0ffd17df6e8f14a0247a18e4b20cc8ba7f162689739bf023c8
-
Filesize
3.0MB
MD5e6bc2271bba13d7e37a20ade9d9eaf42
SHA16b9da2c020ad3602c659ea497daddebe78b790cb
SHA25692d42a64da9f5c1765bd2faad59f577faaaf6987e9d86076530466c883f9c4c8
SHA5121225d150c4abcf9f712c99d0ab56f3a4cdb697a738462c4ca295cef12a31356e3d861732ae4f7476b6595463c85855111cc89af42beb499afa5cf0dbad34394b