Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 01:35
Behavioral task
behavioral1
Sample
c2205ce88f3f35433d63227225a4a991.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2205ce88f3f35433d63227225a4a991.exe
Resource
win10v2004-20240226-en
General
-
Target
c2205ce88f3f35433d63227225a4a991.exe
-
Size
2.0MB
-
MD5
c2205ce88f3f35433d63227225a4a991
-
SHA1
d9f9c29c7f973d7262faae095e47f2e79e2e2d04
-
SHA256
449c7a712601f7c932cafbbb3f17ad12799eb0f469a47fbe49ccde3bc4a41386
-
SHA512
2693ca6208d00b379ab3ebff51ecd2b15141a17c4d0aa8406a54fd22f57cd0084b7de3595faeda8aca21a45b12569f5d7dd2e058638451b292a29cacb9a15ea8
-
SSDEEP
49152:cIj0nsfLaXMngP3GQ7ai7D3xTgOxYwpKQbv69GGLzGbzMWhLbGQ7ai7D3xTgOxYj:jjSsfm8ngP3D2i7D3xkOxYwpKQbvwpuw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2976 c2205ce88f3f35433d63227225a4a991.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 c2205ce88f3f35433d63227225a4a991.exe -
Loads dropped DLL 1 IoCs
pid Process 340 c2205ce88f3f35433d63227225a4a991.exe -
resource yara_rule behavioral1/memory/340-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x00080000000120dc-17.dat upx behavioral1/files/0x00080000000120dc-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 c2205ce88f3f35433d63227225a4a991.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 c2205ce88f3f35433d63227225a4a991.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 c2205ce88f3f35433d63227225a4a991.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 c2205ce88f3f35433d63227225a4a991.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 340 c2205ce88f3f35433d63227225a4a991.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 340 c2205ce88f3f35433d63227225a4a991.exe 2976 c2205ce88f3f35433d63227225a4a991.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 340 wrote to memory of 2976 340 c2205ce88f3f35433d63227225a4a991.exe 29 PID 340 wrote to memory of 2976 340 c2205ce88f3f35433d63227225a4a991.exe 29 PID 340 wrote to memory of 2976 340 c2205ce88f3f35433d63227225a4a991.exe 29 PID 340 wrote to memory of 2976 340 c2205ce88f3f35433d63227225a4a991.exe 29 PID 2976 wrote to memory of 2556 2976 c2205ce88f3f35433d63227225a4a991.exe 30 PID 2976 wrote to memory of 2556 2976 c2205ce88f3f35433d63227225a4a991.exe 30 PID 2976 wrote to memory of 2556 2976 c2205ce88f3f35433d63227225a4a991.exe 30 PID 2976 wrote to memory of 2556 2976 c2205ce88f3f35433d63227225a4a991.exe 30 PID 2976 wrote to memory of 2724 2976 c2205ce88f3f35433d63227225a4a991.exe 32 PID 2976 wrote to memory of 2724 2976 c2205ce88f3f35433d63227225a4a991.exe 32 PID 2976 wrote to memory of 2724 2976 c2205ce88f3f35433d63227225a4a991.exe 32 PID 2976 wrote to memory of 2724 2976 c2205ce88f3f35433d63227225a4a991.exe 32 PID 2724 wrote to memory of 2464 2724 cmd.exe 34 PID 2724 wrote to memory of 2464 2724 cmd.exe 34 PID 2724 wrote to memory of 2464 2724 cmd.exe 34 PID 2724 wrote to memory of 2464 2724 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe"C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exeC:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe" /TN m5dCTfVw659f /F3⤵
- Creates scheduled task(s)
PID:2556
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN m5dCTfVw659f > C:\Users\Admin\AppData\Local\Temp\wjAq2Z3l.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN m5dCTfVw659f4⤵PID:2464
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b96c6f1185dc4c7aa6d435559b7446dc
SHA152aabc92111cad2900e5643c7027f18bc408252f
SHA2566a7a646adf5475e2d5521f0e0f531bdd6eb75f3d9ecc4990474f4cac6245042c
SHA512d43d55ac33d549d7dd434353de859eae91c5a9827f93010035cc01c2cf0f4ee422a8d4a884c3e0a49e2fc4a6b60d86007d3cfc6a725c799ff415539a12fb2836
-
Filesize
1KB
MD50401f8c9cf2013912663838eae8a1723
SHA1dc6a8ab19d958bdf75b0bac49d5565f250552982
SHA2569d26ed73c9e4a7aaade188fc47958aeabe497fdea119d8bf492ca62a7a83e5ae
SHA512e639e09eaa3f3cb9c9ac61cd7ba06613343ce7ed87a90cf769eaab58dd29cf1419edfec1f2f45a4092b7fb218b8cf23a7a48a79458deec03c93a8734f60db7a9
-
Filesize
385KB
MD51d90e97b55c009bdd4e88a3107ac4ae6
SHA1377eec2ce2bccb48e7479ec82fbd18cfc3bcfeb0
SHA256606ee16f267086c2c694e2edb7335549b86a39f555198f53c6f6b82fd661ecb1
SHA512467e1a61dd1882774f54a938fa6fda20971f16388f610a671a14a9f3431dcc7c1867d8210b5055b6714b5d95ee1ab0b388fcb6079be27aa15dad56741de40b7c