Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 13:59
Behavioral task
behavioral1
Sample
74df2e8dbaf64ec029461275f250ba34.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74df2e8dbaf64ec029461275f250ba34.exe
Resource
win10v2004-20231215-en
General
-
Target
74df2e8dbaf64ec029461275f250ba34.exe
-
Size
1003KB
-
MD5
74df2e8dbaf64ec029461275f250ba34
-
SHA1
7f365b55f6a612879110767ac1c1c1331ecf70af
-
SHA256
d6b60e576781cb6e1b09ce304f2f3c75bc83f5c07b281e06da66751891bd831f
-
SHA512
69091b6ff32310c1f0c93460272e6dd65d41e66f5f6e54b2e10020a36cae02a3717919961ae6f8275d5b4f35ced5d4a8a1e0bbad5603628ca031dba9e3db2ea4
-
SSDEEP
24576:zn+kv1i5NX+Wc7KSnIyeCZi8ZSsfXdYLUcyIIfy:z+kvU5NX+Wc7KSIyeC48QsfdYLRyIIf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 74df2e8dbaf64ec029461275f250ba34.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 74df2e8dbaf64ec029461275f250ba34.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 74df2e8dbaf64ec029461275f250ba34.exe -
resource yara_rule behavioral1/memory/2184-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001223a-11.dat upx behavioral1/memory/2184-16-0x0000000022F10000-0x000000002316C000-memory.dmp upx behavioral1/memory/2716-18-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001223a-17.dat upx behavioral1/files/0x000a00000001223a-13.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2088 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 74df2e8dbaf64ec029461275f250ba34.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 74df2e8dbaf64ec029461275f250ba34.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 74df2e8dbaf64ec029461275f250ba34.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 74df2e8dbaf64ec029461275f250ba34.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2184 74df2e8dbaf64ec029461275f250ba34.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2184 74df2e8dbaf64ec029461275f250ba34.exe 2716 74df2e8dbaf64ec029461275f250ba34.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2716 2184 74df2e8dbaf64ec029461275f250ba34.exe 29 PID 2184 wrote to memory of 2716 2184 74df2e8dbaf64ec029461275f250ba34.exe 29 PID 2184 wrote to memory of 2716 2184 74df2e8dbaf64ec029461275f250ba34.exe 29 PID 2184 wrote to memory of 2716 2184 74df2e8dbaf64ec029461275f250ba34.exe 29 PID 2716 wrote to memory of 2088 2716 74df2e8dbaf64ec029461275f250ba34.exe 30 PID 2716 wrote to memory of 2088 2716 74df2e8dbaf64ec029461275f250ba34.exe 30 PID 2716 wrote to memory of 2088 2716 74df2e8dbaf64ec029461275f250ba34.exe 30 PID 2716 wrote to memory of 2088 2716 74df2e8dbaf64ec029461275f250ba34.exe 30 PID 2716 wrote to memory of 2732 2716 74df2e8dbaf64ec029461275f250ba34.exe 33 PID 2716 wrote to memory of 2732 2716 74df2e8dbaf64ec029461275f250ba34.exe 33 PID 2716 wrote to memory of 2732 2716 74df2e8dbaf64ec029461275f250ba34.exe 33 PID 2716 wrote to memory of 2732 2716 74df2e8dbaf64ec029461275f250ba34.exe 33 PID 2732 wrote to memory of 2608 2732 cmd.exe 34 PID 2732 wrote to memory of 2608 2732 cmd.exe 34 PID 2732 wrote to memory of 2608 2732 cmd.exe 34 PID 2732 wrote to memory of 2608 2732 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe"C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exeC:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe" /TN uhTCmbCqd877 /F3⤵
- Creates scheduled task(s)
PID:2088
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uhTCmbCqd877 > C:\Users\Admin\AppData\Local\Temp\1ra0Zzthy.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uhTCmbCqd8774⤵PID:2608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509b99fc78824bb04b9b37e16aebf6488
SHA123c92dfc12d0ff51ca695318c70f0657231e3c8f
SHA25652048596df0788e7913c3fb29e7707fc4fe3f86dc2d338fab17935cc0315a779
SHA512e06a2d17c48b03825e30a0c61064a0b7d72a3949506c48631f51b60850c1b3328c165d2dadbbaa67a7c6dbca27fceca54161123806b796b9763f2eceaf11b245
-
Filesize
685KB
MD56cdc8864551a5b71b362e5a81d858070
SHA1ed1e5a1e29d4f839770779284d347503e0f709b2
SHA2562a425681457b0fff98f7b38f0703a7764a8351564f1c669fefa2be6498a82d18
SHA5127d1648638c3d364d5c43e6a83433a9c987bf2c0546872383a260a319c8a068510a2b670a7ae548ce3dc828e2552355b6c31de67b07a6a1d08d92d4ef34aa075a
-
Filesize
847KB
MD59b72a1a455263b844348413d3f424cff
SHA147a47f3458793ff0c83536ca5e108e0a6b7ab1c3
SHA256896e2be3bb1d8f3ee90a16d572c5f63fe39c7e75e238b82eee557b2e1c70dfd0
SHA512cb3b12201dadee99a3c0b9d54cce1b60739ccad7bed8600ca3ca8f75678d597e4ecfa8b0456ed24762201571124941db8171e636d1ace8b16173fc74f4827a8b
-
Filesize
412KB
MD57dd2c53c7b01aa1993c2f1c9017e0811
SHA1fc7d8f40f256c8e796334f9cab82e2715c2e16a6
SHA2568a210b0ea2b887de9e124ea56267dfc6e686f0002841acd6277ebde1c3437c28
SHA512a938aabe3aadf0b16bf5a9f87d6bd4c2f7eae283a92b9be324940f10963e48b23862a257a7d063a1395ba5e2397fca81bd4831b149763e0dd1fe7eb695025fd0