Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
b4d051eb4e505340638048ae8ada9899.exe
Resource
win7-20240221-en
General
-
Target
b4d051eb4e505340638048ae8ada9899.exe
-
Size
3.1MB
-
MD5
b4d051eb4e505340638048ae8ada9899
-
SHA1
fadd88fad71647894d3aa76010c6606a60388f23
-
SHA256
d03ba24ab70fa01053ef1b27420a0585540d371702c06332bfa1c7fb8999574d
-
SHA512
cdd13f5b6fe6193effa755115685b0df1e2c2003d781e05a93a5b05750a9818a3ff00763fe25e52f8bf60e4006718dc80f203e0705772c6df56e4443762dc8d9
-
SSDEEP
49152:qitOd4k7ydepSSPIZDscC+QZKDVdfu31r:qiK4IIZYfZKDVQFr
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 10 2424 cmd.exe 13 2424 cmd.exe 15 2424 cmd.exe 16 2424 cmd.exe 17 2424 cmd.exe 19 2424 cmd.exe 20 2424 cmd.exe 21 2424 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 cmd.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 api.ipify.org 15 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\cms.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 b4d051eb4e505340638048ae8ada9899.exe 2828 notepad.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe 2424 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2828 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2424 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2504 wrote to memory of 2828 2504 b4d051eb4e505340638048ae8ada9899.exe 28 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31 PID 2828 wrote to memory of 2424 2828 notepad.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4d051eb4e505340638048ae8ada9899.exe"C:\Users\Admin\AppData\Local\Temp\b4d051eb4e505340638048ae8ada9899.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:2524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD5c697f1a27a61ebf609bff2677025dc6e
SHA17acb4240d77cdfdcc26acc64060afed469bcfad4
SHA2562dc29bee0f66ae4463248cb6619b069a3d40c1bef83d1c6139ec11f9b6bd26a6
SHA51258a9148b824fc99b381eda53849e4f523466e53c1898a867847e2aa62d1ecf46fff35b37e36608a18f3ad8a2382ceac2aa821bcd7955b46e4333c10dda6e1751
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e