Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
c64aa0d81a6955ae443268663d734dc4.exe
Resource
win7-20240221-en
General
-
Target
c64aa0d81a6955ae443268663d734dc4.exe
-
Size
6.4MB
-
MD5
c64aa0d81a6955ae443268663d734dc4
-
SHA1
219cc00be870def6b56c46adfc6c2a7928beba37
-
SHA256
d655c80b18e92e48821998ff99afdbaac96ab2c940b70c5b2c0e7770ad1e16c2
-
SHA512
39cf19aefea75eafaf26aef04116f5f1111e11a24c51171b97097137afba45b57ca5b4ea87a01c40be1d91760cf38927f0dd1ca9dca3f59ccb67e253d7d74ca5
-
SSDEEP
196608:Tt2oFyQRCtmyuntvZ4XuFE5wR/CCosGHDzhRrTmAI7:4RnatvZ4WoCosyDzhdDI7
Malware Config
Extracted
cobaltstrike
305419776
http://unattended-upgrades.net:757/d_config.html
-
access_type
512
-
beacon_type
2048
-
host
unattended-upgrades.net,/d_config.html
-
http_header1
AAAAEAAAAB1Ib3N0OiB1bmF0dGVuZGVkLXVwZ3JhZGVzLm5ldAAAAAoAAAARQ29ubmVjdGlvbjogY2xvc2UAAAAHAAAAAAAAAA0AAAADAAAAAgAAABh3cF93b29jb21tZXJjZV9zZXNzaW9uXz0AAAAGAAAABkNvb2tpZQAAAAkAAAAMZWNob3N0cj10cnVlAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAAEAAAAB1Ib3N0OiB1bmF0dGVuZGVkLXVwZ3JhZGVzLm5ldAAAAAoAAAARQ29ubmVjdGlvbjogY2xvc2UAAAAKAAAAJUFjY2VwdC1MYW5ndWFnZTogZW4tR0I7cT0wLjksICo7cT0wLjcAAAAKAAAAGENvbnRlbnQtVHlwZTogdGV4dC9wbGFpbgAAAAcAAAABAAAACAAAAAMAAAAEAAAABwAAAAAAAAADAAAAAgAAAA5fX3Nlc3Npb25fX2lkPQAAAAYAAAAGQ29va2llAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
60641
-
port_number
757
-
sc_process32
%windir%\syswow64\svchost.exe
-
sc_process64
%windir%\sysnative\svchost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCshEynKiaZtiQG+JWKQ9gzX1pTzR9mbIVAwISpAL0qoKSEbNKbZPv495T/9fgNOIoimabjjQRu9sgQKPaOwBUjKjWQISHp7ZjsIHHnqwbbx3lh+eMSvrG2NbzhZsBDY5ByBdox+j8ta1mG/e1RKkdnQ/JIzdXQLftVZAGQ17m5wwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
5.10860288e+08
-
unknown2
AAAABAAAAAIAAAFSAAAAAwAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/Forums
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.111 Safari/537.36
-
watermark
305419776
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x000500000001c849-476.dat family_babadeda -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
pid Process 2556 reporteng.exe -
Loads dropped DLL 2 IoCs
pid Process 2176 c64aa0d81a6955ae443268663d734dc4.exe 2556 reporteng.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2556 2176 c64aa0d81a6955ae443268663d734dc4.exe 28 PID 2176 wrote to memory of 2556 2176 c64aa0d81a6955ae443268663d734dc4.exe 28 PID 2176 wrote to memory of 2556 2176 c64aa0d81a6955ae443268663d734dc4.exe 28 PID 2176 wrote to memory of 2556 2176 c64aa0d81a6955ae443268663d734dc4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c64aa0d81a6955ae443268663d734dc4.exe"C:\Users\Admin\AppData\Local\Temp\c64aa0d81a6955ae443268663d734dc4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\MLtek\Reporting Engine\reporteng.exe"C:\Users\Admin\AppData\Roaming\MLtek\Reporting Engine\reporteng.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD596de71f234bc6ca8cd1d0b708db17451
SHA156e826961265444af1c863833150fef9a6462d6e
SHA256e5c7a991fcc7e6c416678f30dbb1759b4bfcf3552c29ddf66117987fe48f2e86
SHA51287cdb4af50a3ea07eee30f3a0ff931621366720f898da8eb102d65cffa38af91f46e615bcde35efa42c6ef16cb7bf5f5e0aae00e3ac0f8a7cc7ab7f05f885253
-
Filesize
3.7MB
MD51203f7ae6d5b85ab2532aac0d5d45616
SHA18d6cdb874b1783f16a4697623f298c63614ba1af
SHA2565163874830b2003578414c840765ff81887588a4fa42abaf32176cddb8cf6e20
SHA51297e676b41102cc57882e20e2cb2f15b18b2f5f4624cc915b45dac3d71cad0f1c23ee1ceebf7ffb5d5f58149a646c97d7bca9800c60cbe47b79e0c2f905b0fa0b
-
Filesize
3.2MB
MD5f79662b3256ab52078605a7213a5afc5
SHA13321705ff38f80c18054be3718831ef150c3b8eb
SHA2560471877ad1829203bfbbd6fb1b7b8b7eb9373ff66fa06d2f664dce551bdcc599
SHA512b65da67990efcd9d4eb95c22adf4c0594599cc4f7d7d2cb19cdc491026e2ebdfae962bb3c73e3d795cbebb7e591fb5f57be31ae60925e49489156892034a5700
-
Filesize
490B
MD55d1f7da1c3d95020a0708118145364d0
SHA102f630e7ac8b8d400af219bd8811aa3a22f7186e
SHA256d2d828c2c459b72ee378db6c5ac295315b8a783b7049032f92ed4fcb2a89684a
SHA5126bbdaaef1478ffd9e9d3a95d300f35b9ac6f3ce6564e80734445a827ad8761233db36c679fac117f363bae27918983520f0e2f408205d3549b001fc4ae4c920c
-
C:\Users\Admin\AppData\Roaming\MLtek\Reporting Engine\res\public\en\html\startpage_connect_to_data_no_mru.html
Filesize1KB
MD520bbd307866f19a5af3ae9ebd5104018
SHA18e03c9b18b9d27e9292ee154b773553493df1157
SHA256e4fe51c170e02a01f30a4db8b458fb9b8dee13a7740f17765ba4873fac62c5f7
SHA512420a132ad4ba3a67f5b66a3e463c4fa495b7941d58d6d669a8c984380607a03f0afa1c92bcf1f8d1fc5d93838ea611f7f9cf439bb3ada0142431b119ddfad40d
-
C:\Users\Admin\AppData\Roaming\MLtek\Reporting Engine\res\public\en\html\startpage_connect_to_data_with_mru.html
Filesize1KB
MD5e6bc0d078616dd5d5f72d46ab2216e89
SHA1f70534bb999bcb8f1db0cf25a7279757e794499f
SHA256e8f50f17c994f394239350951a40c3454e9b52b0ca95cf342f2577828f390a54
SHA5126ccd6e19ec63f20c86a28ccaffa609a2d0de7991a8eb2d6ea016bcc5d0e9f2fc28c33a15c4af891f28a9e1e4131f38f84f8e1a8859e020d6f267977075f7c66a
-
Filesize
720B
MD50a5b47256c14570b80ef77ecfd2129b7
SHA169210a7429c991909c70b6b6b75fe4bc606048ae
SHA2561934657d800997dedba9f4753150f7d8f96dd5903a9c47ed6885aabf563bf73d
SHA5125ca22260d26ec5bb1d65c4af3e2f05356d7b144836790ac656bf8c1687dd5c7d67a8a46c7bde374ec9e59a1bedc0298a4609f229d997409a0cc5453ef102ecb2
-
C:\Users\Admin\AppData\Roaming\MLtek\Reporting Engine\res\public\en\html\startpage_topstrip_no_mru.html
Filesize659B
MD5eced86c9d5b8952ac5fb817c3ce2b8ba
SHA13ca24e69df7a4b81f799527a97282799fcd3f1e2
SHA2563988afa43d3c716ecbe4e261ff13c32fe67baaaf1718eac790040cff2aa4e44d
SHA512a21e88968c30f14363a73dfd7801cea34255acb968160fad59d813bb64352583c8c4f6cd9d45811676ca5ca90a4250601a53e80b6f41d6727465f3a57e7423a1
-
C:\Users\Admin\AppData\Roaming\MLtek\Reporting Engine\res\public\en\html\startpage_topstrip_with_mru.html
Filesize798B
MD5cc4d8a787ab1950c4e3aac5751c9fcde
SHA1d026a156723a52c34927b5a951a2bb7d23aa2c45
SHA25613683e06e737e83ca94505b1cd1cd70f4f8b2cc5e7560f121a6e02ed1a06e7ee
SHA512e0b01f5ee4da60e35a4eb94490bed815aea00382f3b9822b7c29294cf86a2fe480dba704f086a38f9d7aaf39e8160f49cf806b6b6c44651de56e290249dd9ebe
-
Filesize
2KB
MD5f2ab3e5fb61293ae8656413dbb6e5dc3
SHA153b3c3c4b57c3d5e2d9a36272b27786cd60f0eb5
SHA25606db4d53adf4a1ecbc03ed9962af7f46fd3a54668d45907dc1737125e38ec192
SHA5122c31cad868e1e5149a4308a149104ac3d88907894699fb0413860c8f578de32f6814b08d518de7a7fe3782f0cea173cb1766da7c25f2bcdddaffae7bc0da927c
-
C:\Users\Admin\AppData\Roaming\MLtek\Reporting Engine\res\public\en\stylesheets\start_page_landing.css
Filesize282B
MD549617add7303a8fbd24e1ad16ba715d8
SHA131772218ccf51fe5955625346c12e00c0f2e539a
SHA256b3a99eea19c469dab3b727d1324ed87d10999133d3268ed0fadd5a5c8d182907
SHA5129d1198ca13a0c1f745b01aabc23b60b8e0df4f12d7fdf17e87e750f021fc3800ea808af6c875848b3850061070dfd54c2e34d92cea4e8a2bf4736fbcfd129d1e
-
Filesize
551KB
MD594d53a5a99df728359716acb35c7befd
SHA138d9a132d5df4751ff0dc8a5782591c61375c045
SHA256125820b942b34f7e7082041a72ddda3e51b372d734cc1c59dc8c7d89931947c4
SHA512e141d89cbb7acceb5e78c56ecd110e0847cb859c12337af0758ee4603646870814d7c59005c4dd564708140f4fbe24a00153ec4b839354dc594e71309667aa1b
-
Filesize
2.4MB
MD5418fc41e4e647d099860e857f06f8f14
SHA1aed3238f2c7f043e9947622a77aca702107454f9
SHA256d110288b97f5cb0fb848790de6727fde311e843138bf6df065ec00f31a509c47
SHA512607e434820bab611590c2455c2843e243bdc11e9a0468c841f8c23322f259c7fc8cddfe663ba6c12190113a828d9d968be2099893cbf2ad83ef6665c42b66871
-
Filesize
4.0MB
MD56bda7b4185c1ed811b4321bb6cbc77aa
SHA1a8199036a09f453fe2ab8d68b3c2a5295525040f
SHA256a957c6b9aba690defaa9639634815712b1f747eed8bfe46c5c4f262593505715
SHA51221697418d075aabb92013028e74a99c0e125d4b18f083f8d63e55219a5f5c2df8159e50d7b82d7eed5b3496086b63d1c6def634a6b17920ae7e418aa791ddb6e