Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 22:10
Behavioral task
behavioral1
Sample
acfa7d3c45d24c59a66e38b84dc706a2.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
acfa7d3c45d24c59a66e38b84dc706a2.exe
Resource
win10v2004-20240226-en
General
-
Target
acfa7d3c45d24c59a66e38b84dc706a2.exe
-
Size
3.9MB
-
MD5
acfa7d3c45d24c59a66e38b84dc706a2
-
SHA1
0c85fee87d28ed05a49eb43e0d6e7d9f657aae77
-
SHA256
8281bedcd69c69210af5709e31e1dc34a866a996bc019d78829f0f1672e12a0c
-
SHA512
be6d104703817e15e3e95f7854648b65378b990b951e881b4f5afa944468ae9fa436c556b584dfff3b4b647522497347a674c453fc48f989fc60c90e4b6443e8
-
SSDEEP
98304:VpK4al3D2i7D3xkOxYwpKUcO1IQL6D2i7D3xkOxYwpK3Dh/8akNiD2i7D3xkOxY2:XOl3h7FkNqK5Ozuh7FkNqK3Dh/8akYh5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe -
Executes dropped EXE 1 IoCs
pid Process 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 acfa7d3c45d24c59a66e38b84dc706a2.exe -
resource yara_rule behavioral1/memory/1636-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c000000012253-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3008 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 acfa7d3c45d24c59a66e38b84dc706a2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 acfa7d3c45d24c59a66e38b84dc706a2.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 acfa7d3c45d24c59a66e38b84dc706a2.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 acfa7d3c45d24c59a66e38b84dc706a2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1636 acfa7d3c45d24c59a66e38b84dc706a2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1636 acfa7d3c45d24c59a66e38b84dc706a2.exe 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1332 1636 acfa7d3c45d24c59a66e38b84dc706a2.exe 29 PID 1636 wrote to memory of 1332 1636 acfa7d3c45d24c59a66e38b84dc706a2.exe 29 PID 1636 wrote to memory of 1332 1636 acfa7d3c45d24c59a66e38b84dc706a2.exe 29 PID 1636 wrote to memory of 1332 1636 acfa7d3c45d24c59a66e38b84dc706a2.exe 29 PID 1332 wrote to memory of 3008 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe 30 PID 1332 wrote to memory of 3008 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe 30 PID 1332 wrote to memory of 3008 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe 30 PID 1332 wrote to memory of 3008 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe 30 PID 1332 wrote to memory of 2976 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe 33 PID 1332 wrote to memory of 2976 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe 33 PID 1332 wrote to memory of 2976 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe 33 PID 1332 wrote to memory of 2976 1332 acfa7d3c45d24c59a66e38b84dc706a2.exe 33 PID 2976 wrote to memory of 2532 2976 cmd.exe 34 PID 2976 wrote to memory of 2532 2976 cmd.exe 34 PID 2976 wrote to memory of 2532 2976 cmd.exe 34 PID 2976 wrote to memory of 2532 2976 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\acfa7d3c45d24c59a66e38b84dc706a2.exe"C:\Users\Admin\AppData\Local\Temp\acfa7d3c45d24c59a66e38b84dc706a2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\acfa7d3c45d24c59a66e38b84dc706a2.exeC:\Users\Admin\AppData\Local\Temp\acfa7d3c45d24c59a66e38b84dc706a2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\acfa7d3c45d24c59a66e38b84dc706a2.exe" /TN w6CK1HQd991c /F3⤵
- Creates scheduled task(s)
PID:3008
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN w6CK1HQd991c > C:\Users\Admin\AppData\Local\Temp\BJVjHCdr.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN w6CK1HQd991c4⤵PID:2532
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53ab70d87411fedc7bbc4c76429ecb86b
SHA1e20352c04c5b1a98977ec1dbbfc54f29410b6f83
SHA256a4330836f32fa56ceda4f06150b1ca4936c04c5475689cff81a0ea65cab643d6
SHA5121a9fac53a1717c9389f23ad387147d5aa131b79cf43130724dddbc142a6e4e6fe85aa319e3801a2802c33032ff172c7df2e24df9af455f09cd1743d034ae2159
-
Filesize
3.9MB
MD53f537a0e0d613eaed7ca2ab6b5c5745d
SHA1794186d4b619dcfa3478ab6ab858dd8d90dc5376
SHA2562b6362d0ad5f57bc1b3fd5f1fc01e4d69bbec26ea169d160c94b2df9e397fd2e
SHA512e15f278e750122abcb3b7a0c48e4706f9a40f0b394b88e6d0bf33f2c90bcba5f87f5ec52556a3d20b2a128857bcdc891f70b2a697b33f2995596badc3972d1a2