Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 04:27
Behavioral task
behavioral1
Sample
9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe
Resource
win10v2004-20231215-en
General
-
Target
9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe
-
Size
3.9MB
-
MD5
9ac0a5ef61d04e1fed2f3eef3ec3cc23
-
SHA1
15be3a5706b6b6aed98c32fc72bdf035cb64f4da
-
SHA256
95be4288155ca650d266356b1b3b16bfd970a6e76b56a7a4615c6af3cf466d4a
-
SHA512
0d551db674f6451191d629970024e557991d8a0964728216c63b065445da548f9d5b54e2d34454fc0fe0969284638c8acc22145aac325a804db91a70f54aabe0
-
SSDEEP
98304:PuhUBj2zSxoX3uyFBsPB2jWghGCeoX3uyFBsPLWiVnFgYXoX3uyFBsPB2jWghGCu:Guh6SxILFBsPBu8ILFBsPSiVFg4ILFBw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe -
resource yara_rule behavioral1/memory/2088-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000e0000000122db-11.dat upx behavioral1/files/0x000e0000000122db-17.dat upx behavioral1/memory/2728-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2116 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2088 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2728 2088 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 29 PID 2088 wrote to memory of 2728 2088 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 29 PID 2088 wrote to memory of 2728 2088 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 29 PID 2088 wrote to memory of 2728 2088 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 29 PID 2728 wrote to memory of 2116 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 30 PID 2728 wrote to memory of 2116 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 30 PID 2728 wrote to memory of 2116 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 30 PID 2728 wrote to memory of 2116 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 30 PID 2728 wrote to memory of 3040 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 32 PID 2728 wrote to memory of 3040 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 32 PID 2728 wrote to memory of 3040 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 32 PID 2728 wrote to memory of 3040 2728 9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe 32 PID 3040 wrote to memory of 2252 3040 cmd.exe 34 PID 3040 wrote to memory of 2252 3040 cmd.exe 34 PID 3040 wrote to memory of 2252 3040 cmd.exe 34 PID 3040 wrote to memory of 2252 3040 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe"C:\Users\Admin\AppData\Local\Temp\9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\9ac0a5ef61d04e1fed2f3eef3ec3cc23.exeC:\Users\Admin\AppData\Local\Temp\9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9ac0a5ef61d04e1fed2f3eef3ec3cc23.exe" /TN m8v9k5kD0c8e /F3⤵
- Creates scheduled task(s)
PID:2116
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN m8v9k5kD0c8e > C:\Users\Admin\AppData\Local\Temp\guBXAQl.xml3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN m8v9k5kD0c8e4⤵PID:2252
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD547a59124a2d729112e72b88544c7f383
SHA13688c9acbe598708bcc1f50e3b651b6d1b6f37e2
SHA25614009b3bbfc383233b578cc41efde8f1a8ae54c06de166a25b97bcd97320601f
SHA51263777f2a2f785f59aba54d0987abb523d8d8b8f5c0de48c7c15d800573fa8e9d5e6184d6c281f3568a727f0f29485364497225f15e993087049eab70b9052f0a
-
Filesize
1KB
MD5f56c30f7a06a45345b9b13074e8ad4eb
SHA1fba3cd2df7ba94b2073ee18eea394803c8987dd7
SHA256ffb1aa1a4cc031168a2d293c4bc2cceac77f6cc9aec25c277abffa207124a3c3
SHA512eb3891126572a5a2d129dccb91785ab2705dc8fe158bfa09adb2a1d93456db1639aca3d09b35377d1ea30f699beeeb76e31f2b985373eb18734ea61d59fa42ba
-
Filesize
1.2MB
MD5e564154d9f7da5476deaa7762ee9b845
SHA16b7e8d1a9216802e93b66cecac38629d647171f0
SHA256b62961d953ba5ff17e7cf264bf55a76450d2fbf70324516a5d884fdecfc13e5e
SHA512bf959bf1ed95337022544540c8ac4080bebf9236dd3a74e6a416fe7963dff5d938e960408b8dd6525bfabd30d76eea57d685e894717e3771982e8139736aa824