Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/03/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
cc629e5d6fabb0da8f46ecb5d667113d.exe
Resource
win7-20240221-en
General
-
Target
cc629e5d6fabb0da8f46ecb5d667113d.exe
-
Size
3.1MB
-
MD5
cc629e5d6fabb0da8f46ecb5d667113d
-
SHA1
ce1084782c077756fb43a1056cfcfdd80182f54e
-
SHA256
c0503c54556ba129ef04f224cec3c985e7d17f7e39a4574cbd553a67902ec689
-
SHA512
c54ca9ed01b007fc4abc0d72c77253ac2d8802882841a43226764b1fd46e4a1873158d04b396c3b82381fa806abc27cfb6b7778668c656afa53afc6d7c539a4a
-
SSDEEP
49152:jitOd4k7ydepSSPIZDscC+QZKDVdfu315:jiK4IIZYfZKDVQF5
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
flow pid Process 8 2608 cmd.exe 10 2608 cmd.exe 11 2608 cmd.exe 12 2608 cmd.exe 14 2608 cmd.exe 15 2608 cmd.exe 16 2608 cmd.exe 17 2608 cmd.exe 18 2608 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2528 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
pid Process 2608 cmd.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.ipify.org 10 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\cms.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 2296 notepad.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe 2608 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2296 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2608 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2912 wrote to memory of 2296 2912 cc629e5d6fabb0da8f46ecb5d667113d.exe 28 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29 PID 2296 wrote to memory of 2608 2296 notepad.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc629e5d6fabb0da8f46ecb5d667113d.exe"C:\Users\Admin\AppData\Local\Temp\cc629e5d6fabb0da8f46ecb5d667113d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:2528
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5cce5facd1b1f0e76b0492754b4286db5
SHA19e4dcb2d067d58a81657d2dd8e6f113556caefef
SHA256e6475ffc8461d0dbf125b36890b98b1c6bc598bce242219c3298584e7552da8a
SHA512c0ff512d36ca612d586a6e23e4c8792266d245b04a26655c964bd8136617799b6ba95b9ffe0c6b61c709376a11429dde01fac327b042abbc1ab2218385e6d91a