Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 22:13

General

  • Target

    8d7c23f8accdd390dbc7c19c4cf80f06.exe

  • Size

    2.0MB

  • MD5

    8d7c23f8accdd390dbc7c19c4cf80f06

  • SHA1

    f93a224f46c1986e040f7bd7461a904bc38b608f

  • SHA256

    c094a1742298fa0cdea750a9f64892d250dfcd361ed1baffbcd5c752fcb26715

  • SHA512

    9894da06c276bfb85648829528b136c5ff71dec161050676465fce48fa2984d62941ba2390bf4a8b06127dd4c00c7f27beb91e31368bd99270624f46d26db695

  • SSDEEP

    49152:kOL8lm9XiydIgcakLz0ibq6yqhhubDY0CgOnQvEn0bcakLz0ibq6yqh:kOYlm9iydIgcakcibiqhMbMgOn7n0bcH

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe
    "C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe
      C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe" /TN WAgLRKqP8c0d /F
        3⤵
        • Creates scheduled task(s)
        PID:2708
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN WAgLRKqP8c0d > C:\Users\Admin\AppData\Local\Temp\nfrcHEob.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN WAgLRKqP8c0d
          4⤵
            PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe

      Filesize

      746KB

      MD5

      29dad6f72da3a47f74f270cad121c62f

      SHA1

      a74156997599758c4264371bcc254b06e623fc15

      SHA256

      2fa269904b9e51ff6a241a250c2c4a9ef69ee7229ea242b59d4d8c0a0442e377

      SHA512

      f3765604752d9651d4d6e6b0f0ff1a494ded27f8005f99c43d312053dc88fce96190baf1d507839effbc5c3436370e44b96d5390992fbf90c361e1098bc052af

    • C:\Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe

      Filesize

      504KB

      MD5

      320c87cf54866e987168e21ab5f8145f

      SHA1

      e426e30f4b610dde40879f8890773d6e0e0aafe7

      SHA256

      d3cee31a8a2dbcb2fd27b5307bd776bc083f39790b8a6091b7b1b09404a42af6

      SHA512

      fb08095175a1d95ab122f1826784b29b82eab4867f9b04e7c88f72db253b9af19f04a8283ab8b67071a589f081e8fd2b319986d8476f39fa722dc3ffe6d5953f

    • \Users\Admin\AppData\Local\Temp\8d7c23f8accdd390dbc7c19c4cf80f06.exe

      Filesize

      857KB

      MD5

      5e33b834418f5d2a345f19c3b6cb628d

      SHA1

      22878ec828930d8894917cfaafba0487987ab3e2

      SHA256

      c60c83bf25a96d37deb395f7f7a461c9a448ffef8152805d6b5ab0b05f83fc0e

      SHA512

      0f446c4ce83c1ebc3355e3874347a7a2e301f919b3f36ddecf02c13103841577531a4489560d13c8f65e86575f4d675fbbb865f1175f54e51a77eb6416eec7f1

    • memory/2248-21-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/2248-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2248-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2248-28-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/2248-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2492-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2492-16-0x0000000023210000-0x000000002346C000-memory.dmp

      Filesize

      2.4MB

    • memory/2492-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2492-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2492-2-0x0000000000320000-0x000000000039E000-memory.dmp

      Filesize

      504KB

    • memory/2492-53-0x0000000023210000-0x000000002346C000-memory.dmp

      Filesize

      2.4MB