Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 21:04
Behavioral task
behavioral1
Sample
9799581fa7ef2b08fc2f8a03338b2ebb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9799581fa7ef2b08fc2f8a03338b2ebb.exe
Resource
win10v2004-20231222-en
General
-
Target
9799581fa7ef2b08fc2f8a03338b2ebb.exe
-
Size
1003KB
-
MD5
9799581fa7ef2b08fc2f8a03338b2ebb
-
SHA1
ce2140c2dc94ad4df3580d373d5d190ee27ae0c8
-
SHA256
536bb16b1272de3801d2ce83cb82208e9d888e346f4da7116c6a8473cb3ea5f0
-
SHA512
f37745c6c0b6007cc056604f377838be50b1db3a9cbab08f015f8e29d6f9e637117a974d8e61359dab9b023db4fddf4723689460979a792d6f5e449bc02bf636
-
SSDEEP
24576:/fkX5IuHnl2shriAdnyfl43kLCGrNhiWtSCjHg:/fkX5FlHriMyt43kLCGrNhiW0CjA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 9799581fa7ef2b08fc2f8a03338b2ebb.exe -
resource yara_rule behavioral1/memory/1992-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000012280-11.dat upx behavioral1/memory/1992-15-0x0000000023010000-0x000000002326C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2708 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 9799581fa7ef2b08fc2f8a03338b2ebb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 9799581fa7ef2b08fc2f8a03338b2ebb.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 9799581fa7ef2b08fc2f8a03338b2ebb.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 9799581fa7ef2b08fc2f8a03338b2ebb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1992 9799581fa7ef2b08fc2f8a03338b2ebb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1992 9799581fa7ef2b08fc2f8a03338b2ebb.exe 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2716 1992 9799581fa7ef2b08fc2f8a03338b2ebb.exe 29 PID 1992 wrote to memory of 2716 1992 9799581fa7ef2b08fc2f8a03338b2ebb.exe 29 PID 1992 wrote to memory of 2716 1992 9799581fa7ef2b08fc2f8a03338b2ebb.exe 29 PID 1992 wrote to memory of 2716 1992 9799581fa7ef2b08fc2f8a03338b2ebb.exe 29 PID 2716 wrote to memory of 2708 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe 30 PID 2716 wrote to memory of 2708 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe 30 PID 2716 wrote to memory of 2708 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe 30 PID 2716 wrote to memory of 2708 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe 30 PID 2716 wrote to memory of 2752 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe 32 PID 2716 wrote to memory of 2752 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe 32 PID 2716 wrote to memory of 2752 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe 32 PID 2716 wrote to memory of 2752 2716 9799581fa7ef2b08fc2f8a03338b2ebb.exe 32 PID 2752 wrote to memory of 2736 2752 cmd.exe 34 PID 2752 wrote to memory of 2736 2752 cmd.exe 34 PID 2752 wrote to memory of 2736 2752 cmd.exe 34 PID 2752 wrote to memory of 2736 2752 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9799581fa7ef2b08fc2f8a03338b2ebb.exe"C:\Users\Admin\AppData\Local\Temp\9799581fa7ef2b08fc2f8a03338b2ebb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\9799581fa7ef2b08fc2f8a03338b2ebb.exeC:\Users\Admin\AppData\Local\Temp\9799581fa7ef2b08fc2f8a03338b2ebb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9799581fa7ef2b08fc2f8a03338b2ebb.exe" /TN MXmKXYLpa01b /F3⤵
- Creates scheduled task(s)
PID:2708
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN MXmKXYLpa01b > C:\Users\Admin\AppData\Local\Temp\fTstJSbf.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN MXmKXYLpa01b4⤵PID:2736
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58e2516e89e09a4fb13d9ecd97ed38a9c
SHA1b07c9ef8843bd1d3d622aa43bc4dc4ab28fab935
SHA256833f47190da59dafb7474c8c12eec42351369d71e2dbf512a70b72877a380453
SHA51225039fd5fdc87a434478df35954623940ad32406310ad2ca7cb4a6941c33c593818a53ceed46cd5330767290f252c7794dcd1b9996d2054c6a313c9c19cc6039
-
Filesize
1003KB
MD548566f1bdbe6e4f330979477f5ccdec9
SHA1cf87881e63e6269799b204cec0363da59c145cc5
SHA256a07de7f2ab394738f565800de9ffa40516a47d1aa7f181a5b37762c8bbb569d0
SHA51291c7f4a43c3b437420cc173fd4e5038e74d9354688b082421b9c36bc26e875cea4820ee8d8b06cb4dc6812526587747af705f802311c069d6e9fb41b91764c92