Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 18:24
Behavioral task
behavioral1
Sample
72bb53ceee38b35cebf0749d11f006f8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72bb53ceee38b35cebf0749d11f006f8.exe
Resource
win10v2004-20231222-en
General
-
Target
72bb53ceee38b35cebf0749d11f006f8.exe
-
Size
501KB
-
MD5
72bb53ceee38b35cebf0749d11f006f8
-
SHA1
bb5eeb9a93cafd830f08a671dddbffd1078dbeab
-
SHA256
7fd8d87eb262a99f9d5414a8291a3fb6c9aa37904b1271dae32443d7e3ea4aaf
-
SHA512
34e0005936cb32888fa060c0534be942229097373b2d70713e84c7bb6c3b40364ec0ebfd2e09a68332a11817b561b7db2e543bcf3f6d10e8407be7d36fe45cac
-
SSDEEP
12288:vboD2LT14nLg/pQ6FlldJenT5oHiEWSwvExHChexZk1GByKA:8y14nk/pJ3ld058S7s1D0QyN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 72bb53ceee38b35cebf0749d11f006f8.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 72bb53ceee38b35cebf0749d11f006f8.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 72bb53ceee38b35cebf0749d11f006f8.exe -
resource yara_rule behavioral1/memory/2496-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2660-17-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012243-16.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2996 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 72bb53ceee38b35cebf0749d11f006f8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 72bb53ceee38b35cebf0749d11f006f8.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 72bb53ceee38b35cebf0749d11f006f8.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 72bb53ceee38b35cebf0749d11f006f8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2496 72bb53ceee38b35cebf0749d11f006f8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2496 72bb53ceee38b35cebf0749d11f006f8.exe 2660 72bb53ceee38b35cebf0749d11f006f8.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2660 2496 72bb53ceee38b35cebf0749d11f006f8.exe 29 PID 2496 wrote to memory of 2660 2496 72bb53ceee38b35cebf0749d11f006f8.exe 29 PID 2496 wrote to memory of 2660 2496 72bb53ceee38b35cebf0749d11f006f8.exe 29 PID 2496 wrote to memory of 2660 2496 72bb53ceee38b35cebf0749d11f006f8.exe 29 PID 2660 wrote to memory of 2996 2660 72bb53ceee38b35cebf0749d11f006f8.exe 30 PID 2660 wrote to memory of 2996 2660 72bb53ceee38b35cebf0749d11f006f8.exe 30 PID 2660 wrote to memory of 2996 2660 72bb53ceee38b35cebf0749d11f006f8.exe 30 PID 2660 wrote to memory of 2996 2660 72bb53ceee38b35cebf0749d11f006f8.exe 30 PID 2660 wrote to memory of 2984 2660 72bb53ceee38b35cebf0749d11f006f8.exe 32 PID 2660 wrote to memory of 2984 2660 72bb53ceee38b35cebf0749d11f006f8.exe 32 PID 2660 wrote to memory of 2984 2660 72bb53ceee38b35cebf0749d11f006f8.exe 32 PID 2660 wrote to memory of 2984 2660 72bb53ceee38b35cebf0749d11f006f8.exe 32 PID 2984 wrote to memory of 2980 2984 cmd.exe 34 PID 2984 wrote to memory of 2980 2984 cmd.exe 34 PID 2984 wrote to memory of 2980 2984 cmd.exe 34 PID 2984 wrote to memory of 2980 2984 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\72bb53ceee38b35cebf0749d11f006f8.exe"C:\Users\Admin\AppData\Local\Temp\72bb53ceee38b35cebf0749d11f006f8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\72bb53ceee38b35cebf0749d11f006f8.exeC:\Users\Admin\AppData\Local\Temp\72bb53ceee38b35cebf0749d11f006f8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\72bb53ceee38b35cebf0749d11f006f8.exe" /TN BSpsfata099d /F3⤵
- Creates scheduled task(s)
PID:2996
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN BSpsfata099d > C:\Users\Admin\AppData\Local\Temp\mcefN.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN BSpsfata099d4⤵PID:2980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD54e5a2608a640a70e8d07af43a925029d
SHA1a14d31669958f326ef4f012334ae50fad84de358
SHA25648030f5d9c6d579684506bd0661da9760ce6f611f0a732848ffa1eb362f2b188
SHA51278077cb07e15ea7ed92dd1925c630d6c16762a73bc0393eb5038e0c115b45b334c72ab0163f37406e786fb6c627479d839ce71a9be3d6f718ad24a37dc7dc7e0
-
Filesize
1KB
MD50fc4df43a20763e3115aa9b86b6701d8
SHA156d1c8a82c25c4884e92613e4832950f25cfa089
SHA25688882d7acf5fbaaca7f99409aed61be7cb7ce7fecf5973aff3fb91cec0693752
SHA51284b24c821f04107ff06d670bfd3722a20e36ff896ddac0c988580a19e2f128cf46318196b7a36e1e314a11befd65e349a2b12de78f35a459b5af5db3acc1cfcf