Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
58c3bb0b6f43606fc0470cb40ff9eca8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58c3bb0b6f43606fc0470cb40ff9eca8.exe
Resource
win10v2004-20231222-en
General
-
Target
58c3bb0b6f43606fc0470cb40ff9eca8.exe
-
Size
385KB
-
MD5
58c3bb0b6f43606fc0470cb40ff9eca8
-
SHA1
4279b6a4e203eaae69455838eac976a44c6f8ef3
-
SHA256
fba483eb0a67c65f639a832f0ede4574c77c70141945de2de030f390d2458077
-
SHA512
86bc14632aff7ecfd81046f36175d328a2d0e40bfd5881fa1a757e5b5f328d876ac57dcf0d186bdd50c08dede6233fdf0038930e2c6f1508b2abc1eb7a1d88dc
-
SSDEEP
6144:VF/57C22z2rD7pCUsQtG/9zd+6oJAXwDAjPhlp5+HerASB0N9YosVOalOEY24v+B:VOSxCWG0AgDmTgIBQ9eEwOEY2ZB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2432 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Loads dropped DLL 1 IoCs
pid Process 1620 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 58c3bb0b6f43606fc0470cb40ff9eca8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 58c3bb0b6f43606fc0470cb40ff9eca8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec529030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1620 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1620 58c3bb0b6f43606fc0470cb40ff9eca8.exe 2432 58c3bb0b6f43606fc0470cb40ff9eca8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2432 1620 58c3bb0b6f43606fc0470cb40ff9eca8.exe 28 PID 1620 wrote to memory of 2432 1620 58c3bb0b6f43606fc0470cb40ff9eca8.exe 28 PID 1620 wrote to memory of 2432 1620 58c3bb0b6f43606fc0470cb40ff9eca8.exe 28 PID 1620 wrote to memory of 2432 1620 58c3bb0b6f43606fc0470cb40ff9eca8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58c3bb0b6f43606fc0470cb40ff9eca8.exe"C:\Users\Admin\AppData\Local\Temp\58c3bb0b6f43606fc0470cb40ff9eca8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\58c3bb0b6f43606fc0470cb40ff9eca8.exeC:\Users\Admin\AppData\Local\Temp\58c3bb0b6f43606fc0470cb40ff9eca8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD525755a8ea0fbc2e827948ca172f6c912
SHA1fc8efaecd5a6f4133b759b3718ea681d143e759b
SHA2565f48cb1f8a9d12a2403567174f90656e99f66117b474877d4de2d19e0fa1bd2a
SHA512229b4ffb04294e6c7f0438e4fe5c41e29da90cbafe2731ae8d216567383b7273b066b245cfd4295a077a44d4a24d182e3708323b526f04c827e3d51dc2cb93a3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
385KB
MD5bab7946e4e4a931100485dcda08c4e73
SHA1a3a107bf7a7026c5067d292c890cfbe68b13aea7
SHA256a098345c8de5f48ad6384c7ee4bf0070b7dc4cf0c2094365e3b2214b3e0e0507
SHA51262a781621d7a977e2cee660c48526935d2c410faf04f43267bcdc7ed196f31121713cd49745f4e494294c119a422e4ea7ea3588c6b74d47d82ac091c1ceb6718