Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 00:46

General

  • Target

    c207539996f18f579f3e0c09659b36d9.exe

  • Size

    2.0MB

  • MD5

    c207539996f18f579f3e0c09659b36d9

  • SHA1

    60a0dd5c49b60a3a72913f7fd6ff83e1176dad3d

  • SHA256

    7290afd24db468e18cd50e88e1ef9142e4090ce40e536f2167be1ce5c79a3555

  • SHA512

    3f968728193cc7dfb2fde2c8627b974c50d4b54d4e847f6234c4f8bda79134d4b193a67872db073780fb407651cdc9539c803ed2a758b7f002589e02e6551269

  • SSDEEP

    49152:j+dPF54ZZYCzWcN+9zWFULG+wk7jF3bQVKqcN+9zWFULG+:j+dPF5AzfA9zyULG+wk7jF3bQVGA9zya

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c207539996f18f579f3e0c09659b36d9.exe
    "C:\Users\Admin\AppData\Local\Temp\c207539996f18f579f3e0c09659b36d9.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\c207539996f18f579f3e0c09659b36d9.exe
      C:\Users\Admin\AppData\Local\Temp\c207539996f18f579f3e0c09659b36d9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c207539996f18f579f3e0c09659b36d9.exe" /TN v3dGbWFyc353 /F
        3⤵
        • Creates scheduled task(s)
        PID:3604
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN v3dGbWFyc353 > C:\Users\Admin\AppData\Local\Temp\mNWC1.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4620
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN v3dGbWFyc353
          4⤵
            PID:2872
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\c207539996f18f579f3e0c09659b36d9.exe

        Filesize

        2.0MB

        MD5

        fe8bfff8472683dbc07f50ac97734624

        SHA1

        1ec3753f1612e0c93521fb5678d2e9dae233dc5d

        SHA256

        e160331c68a7fa0730df181c222e898964e08c34846880fb8fa97e7c74dad80d

        SHA512

        11cd8475e0d106d0ba76230307e3ea7fd0a5084ce0cc694a7af7cc3eea991d9213510f4c509720d8898013f3315cd8411e0662ea1ae1971aec1a1eddcb520139

      • C:\Users\Admin\AppData\Local\Temp\mNWC1.xml

        Filesize

        1KB

        MD5

        e2b268d1f87f4c5c89ff90898947f23b

        SHA1

        865d25bcaf24a14891cf52d8fadb8600143c5173

        SHA256

        615effb53d78407a4129dcb5c3299a77005acc1cdbb456e06bf3991b2428d79b

        SHA512

        e70833619320ec6031bfd69d6601d20d9daf05031138f21be27304690f510beb033f2b27fb5ee223a55d05080b36a324215f4b00db958927f619a1b474440ef0

      • memory/864-0-0x0000000000400000-0x000000000065C000-memory.dmp

        Filesize

        2.4MB

      • memory/864-1-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/864-4-0x0000000001760000-0x00000000017DE000-memory.dmp

        Filesize

        504KB

      • memory/864-13-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2460-14-0x0000000000400000-0x000000000065C000-memory.dmp

        Filesize

        2.4MB

      • memory/2460-15-0x00000000016F0000-0x000000000176E000-memory.dmp

        Filesize

        504KB

      • memory/2460-22-0x0000000000470000-0x00000000004DB000-memory.dmp

        Filesize

        428KB

      • memory/2460-23-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2460-40-0x0000000000400000-0x000000000065C000-memory.dmp

        Filesize

        2.4MB