Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 01:35

General

  • Target

    c2205ce88f3f35433d63227225a4a991.exe

  • Size

    2.0MB

  • MD5

    c2205ce88f3f35433d63227225a4a991

  • SHA1

    d9f9c29c7f973d7262faae095e47f2e79e2e2d04

  • SHA256

    449c7a712601f7c932cafbbb3f17ad12799eb0f469a47fbe49ccde3bc4a41386

  • SHA512

    2693ca6208d00b379ab3ebff51ecd2b15141a17c4d0aa8406a54fd22f57cd0084b7de3595faeda8aca21a45b12569f5d7dd2e058638451b292a29cacb9a15ea8

  • SSDEEP

    49152:cIj0nsfLaXMngP3GQ7ai7D3xTgOxYwpKQbv69GGLzGbzMWhLbGQ7ai7D3xTgOxYj:jjSsfm8ngP3D2i7D3xkOxYwpKQbvwpuw

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe
    "C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe
      C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe" /TN m5dCTfVw659f /F
        3⤵
        • Creates scheduled task(s)
        PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN m5dCTfVw659f > C:\Users\Admin\AppData\Local\Temp\wjAq2Z3l.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN m5dCTfVw659f
          4⤵
            PID:2464

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe

      Filesize

      64KB

      MD5

      b96c6f1185dc4c7aa6d435559b7446dc

      SHA1

      52aabc92111cad2900e5643c7027f18bc408252f

      SHA256

      6a7a646adf5475e2d5521f0e0f531bdd6eb75f3d9ecc4990474f4cac6245042c

      SHA512

      d43d55ac33d549d7dd434353de859eae91c5a9827f93010035cc01c2cf0f4ee422a8d4a884c3e0a49e2fc4a6b60d86007d3cfc6a725c799ff415539a12fb2836

    • C:\Users\Admin\AppData\Local\Temp\wjAq2Z3l.xml

      Filesize

      1KB

      MD5

      0401f8c9cf2013912663838eae8a1723

      SHA1

      dc6a8ab19d958bdf75b0bac49d5565f250552982

      SHA256

      9d26ed73c9e4a7aaade188fc47958aeabe497fdea119d8bf492ca62a7a83e5ae

      SHA512

      e639e09eaa3f3cb9c9ac61cd7ba06613343ce7ed87a90cf769eaab58dd29cf1419edfec1f2f45a4092b7fb218b8cf23a7a48a79458deec03c93a8734f60db7a9

    • \Users\Admin\AppData\Local\Temp\c2205ce88f3f35433d63227225a4a991.exe

      Filesize

      385KB

      MD5

      1d90e97b55c009bdd4e88a3107ac4ae6

      SHA1

      377eec2ce2bccb48e7479ec82fbd18cfc3bcfeb0

      SHA256

      606ee16f267086c2c694e2edb7335549b86a39f555198f53c6f6b82fd661ecb1

      SHA512

      467e1a61dd1882774f54a938fa6fda20971f16388f610a671a14a9f3431dcc7c1867d8210b5055b6714b5d95ee1ab0b388fcb6079be27aa15dad56741de40b7c

    • memory/340-3-0x00000000002D0000-0x000000000034E000-memory.dmp

      Filesize

      504KB

    • memory/340-16-0x00000000232C0000-0x000000002351C000-memory.dmp

      Filesize

      2.4MB

    • memory/340-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/340-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/340-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/340-41-0x00000000232C0000-0x000000002351C000-memory.dmp

      Filesize

      2.4MB

    • memory/2976-20-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2976-22-0x0000000022DB0000-0x0000000022E2E000-memory.dmp

      Filesize

      504KB

    • memory/2976-27-0x0000000000390000-0x00000000003FB000-memory.dmp

      Filesize

      428KB

    • memory/2976-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2976-42-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB