Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 12:43
Behavioral task
behavioral1
Sample
d38aff8e3ae4e047280632dd62c631b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d38aff8e3ae4e047280632dd62c631b3.exe
Resource
win10v2004-20240226-en
General
-
Target
d38aff8e3ae4e047280632dd62c631b3.exe
-
Size
1003KB
-
MD5
d38aff8e3ae4e047280632dd62c631b3
-
SHA1
fd6e214377054e638c491dcf5c17f9f5b6b9d272
-
SHA256
ac6caa0b31fa96e62a568e08991009c50c86ac0c739f011f77feb0c65c0523b4
-
SHA512
854a04c52a2ec35122905f345d9876f70c351794fd5df17115dfdf328383db97443af1fc997b759fcdffd0abc8dc212b1ec67caf9c50a6591569640546cd4e55
-
SSDEEP
24576:7E1erhTOtHL6VX5TIUzcjukL2CDYibq6/yqLNaF:7bhTKW55TIkcakLz0ibq6yqh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2524 d38aff8e3ae4e047280632dd62c631b3.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 d38aff8e3ae4e047280632dd62c631b3.exe -
Loads dropped DLL 1 IoCs
pid Process 620 d38aff8e3ae4e047280632dd62c631b3.exe -
resource yara_rule behavioral1/memory/620-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012265-11.dat upx behavioral1/memory/620-16-0x0000000022F10000-0x000000002316C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2424 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 d38aff8e3ae4e047280632dd62c631b3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 d38aff8e3ae4e047280632dd62c631b3.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 d38aff8e3ae4e047280632dd62c631b3.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 d38aff8e3ae4e047280632dd62c631b3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 620 d38aff8e3ae4e047280632dd62c631b3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 620 d38aff8e3ae4e047280632dd62c631b3.exe 2524 d38aff8e3ae4e047280632dd62c631b3.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 620 wrote to memory of 2524 620 d38aff8e3ae4e047280632dd62c631b3.exe 29 PID 620 wrote to memory of 2524 620 d38aff8e3ae4e047280632dd62c631b3.exe 29 PID 620 wrote to memory of 2524 620 d38aff8e3ae4e047280632dd62c631b3.exe 29 PID 620 wrote to memory of 2524 620 d38aff8e3ae4e047280632dd62c631b3.exe 29 PID 2524 wrote to memory of 2424 2524 d38aff8e3ae4e047280632dd62c631b3.exe 30 PID 2524 wrote to memory of 2424 2524 d38aff8e3ae4e047280632dd62c631b3.exe 30 PID 2524 wrote to memory of 2424 2524 d38aff8e3ae4e047280632dd62c631b3.exe 30 PID 2524 wrote to memory of 2424 2524 d38aff8e3ae4e047280632dd62c631b3.exe 30 PID 2524 wrote to memory of 2636 2524 d38aff8e3ae4e047280632dd62c631b3.exe 32 PID 2524 wrote to memory of 2636 2524 d38aff8e3ae4e047280632dd62c631b3.exe 32 PID 2524 wrote to memory of 2636 2524 d38aff8e3ae4e047280632dd62c631b3.exe 32 PID 2524 wrote to memory of 2636 2524 d38aff8e3ae4e047280632dd62c631b3.exe 32 PID 2636 wrote to memory of 2516 2636 cmd.exe 34 PID 2636 wrote to memory of 2516 2636 cmd.exe 34 PID 2636 wrote to memory of 2516 2636 cmd.exe 34 PID 2636 wrote to memory of 2516 2636 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d38aff8e3ae4e047280632dd62c631b3.exe"C:\Users\Admin\AppData\Local\Temp\d38aff8e3ae4e047280632dd62c631b3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\d38aff8e3ae4e047280632dd62c631b3.exeC:\Users\Admin\AppData\Local\Temp\d38aff8e3ae4e047280632dd62c631b3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d38aff8e3ae4e047280632dd62c631b3.exe" /TN ymuVbjyg4de6 /F3⤵
- Creates scheduled task(s)
PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN ymuVbjyg4de6 > C:\Users\Admin\AppData\Local\Temp\EOs27.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN ymuVbjyg4de64⤵PID:2516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5947e204e911090d2a389c8f3c2d1e290
SHA1d515fb2744dbecb4e92c0e5e8cfc4a56e7095dfb
SHA2563b33dd6ce1a5839850b773b2c26103eb44fb9131b7f956e34e0d904de621acdf
SHA51221c60a28536defa7b837d962c0dd87fc86fc9dd333cdec91f209e06436559af85c46c2c7afbb7534825d98d754174c74f03d28855c3eb448964d100af2865716
-
Filesize
1003KB
MD5fe07ec07e9383a1d57865be0e68cb520
SHA165337dea10cc117a3626c33f627c87a0206b1223
SHA256dd43e02d971b3b1c0695ba9d11a2188c3e3b54eeadc4a2033b2751c39ee8fb24
SHA5120e27e1d39477656c76be03b3609c89bd3ef95add3135b13afe106eff2d259e63999a7b2b340c04e55120ebf35d0ff1a9f5a9fc5f80083902ec950f0570616ca7