Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 10:49
Behavioral task
behavioral1
Sample
abb3bf8907d144cb39d32743cdd2ea19.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
abb3bf8907d144cb39d32743cdd2ea19.exe
Resource
win10v2004-20240226-en
General
-
Target
abb3bf8907d144cb39d32743cdd2ea19.exe
-
Size
7.8MB
-
MD5
abb3bf8907d144cb39d32743cdd2ea19
-
SHA1
1727df12590e15584d8554f5c2d7190ddb995bb7
-
SHA256
e0461cb96736506138245b3422fb45c444a437414f1104afbf8731aca7bddfe2
-
SHA512
3b20343a26d10d445e54d574c48ed308cfa62a13f6881c9f8b2f7d8476307226e82f7416d381ebb38ccbe1d237758efcf2f418ca483fbcc214a77347ddb4bfe2
-
SSDEEP
196608:hJJ9CLhEpdlirpNRo8RdlirbZdlirpNRo8Rdlirt5IV0XdlirpNRo8RdlirbZdln:hJTcdNRbpNRb6o0oNRbpNRb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2024 abb3bf8907d144cb39d32743cdd2ea19.exe -
Executes dropped EXE 1 IoCs
pid Process 2024 abb3bf8907d144cb39d32743cdd2ea19.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 abb3bf8907d144cb39d32743cdd2ea19.exe -
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012252-11.dat upx behavioral1/memory/2108-16-0x0000000023FF0000-0x000000002424C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2520 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 abb3bf8907d144cb39d32743cdd2ea19.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 abb3bf8907d144cb39d32743cdd2ea19.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 abb3bf8907d144cb39d32743cdd2ea19.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 abb3bf8907d144cb39d32743cdd2ea19.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 abb3bf8907d144cb39d32743cdd2ea19.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2108 abb3bf8907d144cb39d32743cdd2ea19.exe 2024 abb3bf8907d144cb39d32743cdd2ea19.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2024 2108 abb3bf8907d144cb39d32743cdd2ea19.exe 29 PID 2108 wrote to memory of 2024 2108 abb3bf8907d144cb39d32743cdd2ea19.exe 29 PID 2108 wrote to memory of 2024 2108 abb3bf8907d144cb39d32743cdd2ea19.exe 29 PID 2108 wrote to memory of 2024 2108 abb3bf8907d144cb39d32743cdd2ea19.exe 29 PID 2024 wrote to memory of 2520 2024 abb3bf8907d144cb39d32743cdd2ea19.exe 30 PID 2024 wrote to memory of 2520 2024 abb3bf8907d144cb39d32743cdd2ea19.exe 30 PID 2024 wrote to memory of 2520 2024 abb3bf8907d144cb39d32743cdd2ea19.exe 30 PID 2024 wrote to memory of 2520 2024 abb3bf8907d144cb39d32743cdd2ea19.exe 30 PID 2024 wrote to memory of 2808 2024 abb3bf8907d144cb39d32743cdd2ea19.exe 32 PID 2024 wrote to memory of 2808 2024 abb3bf8907d144cb39d32743cdd2ea19.exe 32 PID 2024 wrote to memory of 2808 2024 abb3bf8907d144cb39d32743cdd2ea19.exe 32 PID 2024 wrote to memory of 2808 2024 abb3bf8907d144cb39d32743cdd2ea19.exe 32 PID 2808 wrote to memory of 2488 2808 cmd.exe 34 PID 2808 wrote to memory of 2488 2808 cmd.exe 34 PID 2808 wrote to memory of 2488 2808 cmd.exe 34 PID 2808 wrote to memory of 2488 2808 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\abb3bf8907d144cb39d32743cdd2ea19.exe"C:\Users\Admin\AppData\Local\Temp\abb3bf8907d144cb39d32743cdd2ea19.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\abb3bf8907d144cb39d32743cdd2ea19.exeC:\Users\Admin\AppData\Local\Temp\abb3bf8907d144cb39d32743cdd2ea19.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\abb3bf8907d144cb39d32743cdd2ea19.exe" /TN zi2YS8HC0bf2 /F3⤵
- Creates scheduled task(s)
PID:2520
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN zi2YS8HC0bf2 > C:\Users\Admin\AppData\Local\Temp\YQAa3pbRU.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN zi2YS8HC0bf24⤵PID:2488
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d525f54a4329472df5cae739955efece
SHA1b732da0fa42e4017cfe3474edd6700b1e08573d8
SHA256eca39c48401b11d5ed1f101d20c0ebaaf607ef25ae14ea49868f173c3797b40b
SHA5124af63b8f85a2d9cca052466777ebc95718f70b8b5f010523306fc927002c016918233d2b3bac5c99bacb476b348c78c8ee71b41467d38ddb888e8516b78adf13
-
Filesize
7.8MB
MD5c89e11da10481f2e5a66575d9d4ea9da
SHA17e5162e483f434b829569a7cd0619ad6f116a7d4
SHA256424514df58b34797d423395eb2cfe6d5e1898c2e475c6b324522ea21838c900c
SHA5126caa09bdb7c08eb8ed393a087fd336b3817bedeeef4f45ef113f05b4fc98dbbd6030e072c9ea345ec6de0d60f223fbd17d4b6c3f31095aa9e0a8d0bcee04357b