Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 08:23

General

  • Target

    8bdbeda16bec167f1f6ac033c1f94430.exe

  • Size

    3.9MB

  • MD5

    8bdbeda16bec167f1f6ac033c1f94430

  • SHA1

    9e863cc25d2a96c4d25e8ae77bd40842d8d46bce

  • SHA256

    2a630ced355b4bcc67ab4baca282f796f5867073837a92cd51e5072688e5db12

  • SHA512

    8ce754a81f9f575f13397bc6e61ac37417a21314fe29420bd9a929747f2883066bec98aa39a88f40f536eb1741394983bad3bf450acfe49f921fca510cfb2c36

  • SSDEEP

    98304:uC1QmD5bPIo6DnYnWUtMKiln4K2Io6DnYnWU1UDYpIo6DnYnWUtMKiln4K2Io6Di:uC1QmQoM54MEHkoM54M

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bdbeda16bec167f1f6ac033c1f94430.exe
    "C:\Users\Admin\AppData\Local\Temp\8bdbeda16bec167f1f6ac033c1f94430.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\AppData\Local\Temp\8bdbeda16bec167f1f6ac033c1f94430.exe
      C:\Users\Admin\AppData\Local\Temp\8bdbeda16bec167f1f6ac033c1f94430.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8bdbeda16bec167f1f6ac033c1f94430.exe" /TN U5Z8sQiHf24d /F
        3⤵
        • Creates scheduled task(s)
        PID:2804
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\fC8iusz6.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN U5Z8sQiHf24d
          4⤵
            PID:2684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8bdbeda16bec167f1f6ac033c1f94430.exe

      Filesize

      36KB

      MD5

      a30ea067902d043298815888dd9d65e9

      SHA1

      10b65817e8843039b6552f3386fdb537b2ec66bb

      SHA256

      aa20ced8a94c303e73c4daa09d00a2457603526420a5e0ace63dfb2d8714a81d

      SHA512

      49d0460259367d6a2fe2b76800f7027e46ca4aa9e13acae7772bcfb2fa4c2c21b85dab33a1a74ffeb0823e3535a0b054c4433ed81981f2d48b7c3fecd757111f

    • C:\Users\Admin\AppData\Local\Temp\fC8iusz6.xml

      Filesize

      1KB

      MD5

      0b9190d108b379b6b6d71c65413c55eb

      SHA1

      de388a5b08f6993c820de355c658ec3ef425df94

      SHA256

      86fde0bfcc68cc62a88261432b6d18e6da60814d2d27657193017a35d5a6a031

      SHA512

      f17a2da321d528fe4ca1795ee0eb36539c9f6d3855fa81366fce95b7dc38c2de68d79e9bfae4eddd36a85c8b9f0e5a402a5347897693107762a7762972278d05

    • \Users\Admin\AppData\Local\Temp\8bdbeda16bec167f1f6ac033c1f94430.exe

      Filesize

      880KB

      MD5

      2bc3d4f0b4f0324cd0c864b0da9f6ebf

      SHA1

      d71d2e0777c42ba118b6c6e1f1e80231d7581724

      SHA256

      c47a1a399a8173f1419948e2803baabe6b73240d805f0624817fbc7d5d55c433

      SHA512

      bea10ab41579d30baccd6efbad7a25ff318828c2d57b7c29822e9eba96f80a32a74ecea0e57b8796c6f07c058c087e34edc6e3a3f20c38df3fdb8cb435377bbc

    • memory/2308-0-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2308-1-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2308-3-0x0000000000330000-0x00000000003AE000-memory.dmp

      Filesize

      504KB

    • memory/2308-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2308-15-0x00000000235A0000-0x00000000237FC000-memory.dmp

      Filesize

      2.4MB

    • memory/2892-20-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2892-31-0x00000000002E0000-0x000000000034B000-memory.dmp

      Filesize

      428KB

    • memory/2892-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2892-22-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/2892-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB