Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 16:46
Behavioral task
behavioral1
Sample
bf1ad924d6987b5a15051cb1b2e29e1b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf1ad924d6987b5a15051cb1b2e29e1b.exe
Resource
win10v2004-20240226-en
General
-
Target
bf1ad924d6987b5a15051cb1b2e29e1b.exe
-
Size
1003KB
-
MD5
bf1ad924d6987b5a15051cb1b2e29e1b
-
SHA1
3ed98b6fbd1cca2e191598f7c6ed481b88f84166
-
SHA256
ade0556ed736acfecbcad5c8c64f3642936b34b45282ab9babd34e9e0ea26976
-
SHA512
05e1f3eb2853b6e8dfdecb94e6940a31db0e2d4f66d93eec97e6f005f6cf73150238dcf077152d0129198d86cf6ab4b8ef8d9d8974b70fd8b2b846e9f4deef8f
-
SSDEEP
24576:X4mKRLUeSnplsj37uyZZ+xhlIjTns09OuvQxLwBty/Rhxl6F:Imke/szacZm3STs09Os4Lwy/Rhxl6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe -
Loads dropped DLL 1 IoCs
pid Process 844 bf1ad924d6987b5a15051cb1b2e29e1b.exe -
resource yara_rule behavioral1/memory/2188-17-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0008000000012227-16.dat upx behavioral1/memory/844-0-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2096 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 bf1ad924d6987b5a15051cb1b2e29e1b.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 bf1ad924d6987b5a15051cb1b2e29e1b.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 bf1ad924d6987b5a15051cb1b2e29e1b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 bf1ad924d6987b5a15051cb1b2e29e1b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 844 bf1ad924d6987b5a15051cb1b2e29e1b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 844 bf1ad924d6987b5a15051cb1b2e29e1b.exe 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 844 wrote to memory of 2188 844 bf1ad924d6987b5a15051cb1b2e29e1b.exe 29 PID 844 wrote to memory of 2188 844 bf1ad924d6987b5a15051cb1b2e29e1b.exe 29 PID 844 wrote to memory of 2188 844 bf1ad924d6987b5a15051cb1b2e29e1b.exe 29 PID 844 wrote to memory of 2188 844 bf1ad924d6987b5a15051cb1b2e29e1b.exe 29 PID 2188 wrote to memory of 2096 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe 30 PID 2188 wrote to memory of 2096 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe 30 PID 2188 wrote to memory of 2096 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe 30 PID 2188 wrote to memory of 2096 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe 30 PID 2188 wrote to memory of 2616 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe 32 PID 2188 wrote to memory of 2616 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe 32 PID 2188 wrote to memory of 2616 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe 32 PID 2188 wrote to memory of 2616 2188 bf1ad924d6987b5a15051cb1b2e29e1b.exe 32 PID 2616 wrote to memory of 2088 2616 cmd.exe 34 PID 2616 wrote to memory of 2088 2616 cmd.exe 34 PID 2616 wrote to memory of 2088 2616 cmd.exe 34 PID 2616 wrote to memory of 2088 2616 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf1ad924d6987b5a15051cb1b2e29e1b.exe"C:\Users\Admin\AppData\Local\Temp\bf1ad924d6987b5a15051cb1b2e29e1b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\bf1ad924d6987b5a15051cb1b2e29e1b.exeC:\Users\Admin\AppData\Local\Temp\bf1ad924d6987b5a15051cb1b2e29e1b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\bf1ad924d6987b5a15051cb1b2e29e1b.exe" /TN byLTKWnBb85a /F3⤵
- Creates scheduled task(s)
PID:2096
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN byLTKWnBb85a > C:\Users\Admin\AppData\Local\Temp\NYJl3G.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN byLTKWnBb85a4⤵PID:2088
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54d6ab4420bd2f9ee1fe56c4d65e2e519
SHA1b291ba1829d1083a9670515b45e214a66e0de659
SHA256f0b1852f94a29498551cc8a80007b18d2065661756c2283d2cfca9359c7694bc
SHA512124a600b5645c135a406e1652610f3e9022089998579251242a784d29ce06a5e7cd50dc1c045807af20796f519f42c1adee21733dccbb98518f5015869c4d6a3
-
Filesize
1003KB
MD55bb6872c0e838d30681f4acfcfd64489
SHA14a2c86ca9a9a27bbdeea2c66d3cc4bd8bce6d454
SHA2568ef70ecc10c3479739357e7a2fbb82c7dd33ab26616a668f141288175a110e10
SHA5124dd51859be268a674781aaebb07a40905b0b3b084cf30e91f8dfb5d257d25592ce5c2808e940952305cc769c75cc2f4087574642a117e5abc0b833042a44ec77