Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 18:41
Behavioral task
behavioral1
Sample
deb0e3526170bccd2b0094cac45181fa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
deb0e3526170bccd2b0094cac45181fa.exe
Resource
win10v2004-20240226-en
General
-
Target
deb0e3526170bccd2b0094cac45181fa.exe
-
Size
3.9MB
-
MD5
deb0e3526170bccd2b0094cac45181fa
-
SHA1
99d6166779b08fde66f3b267703106a65fae77a6
-
SHA256
73e64edeab1024947d912529defce1dac12a2e0014994d9aeacd965d7c7bf9ee
-
SHA512
5d0749ff8633715132f59eec22da8b340a11647b0f866ffead3eb4be4bd62a75137fb8abbc00a08c1e9e9b827d85ee15a22880b2314fdecf6ac7d865128ed810
-
SSDEEP
98304:+doRrdocakcibiqh8cxsBD6HMTJcakcibiqhiObrP2dYza3AOcakcibiqh8cxsBW:qoBCdlirmBDYudlirACrwT31dlirmBDK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 deb0e3526170bccd2b0094cac45181fa.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 deb0e3526170bccd2b0094cac45181fa.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 deb0e3526170bccd2b0094cac45181fa.exe -
resource yara_rule behavioral1/memory/2100-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012251-11.dat upx behavioral1/memory/2100-16-0x0000000023590000-0x00000000237EC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1444 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 deb0e3526170bccd2b0094cac45181fa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 deb0e3526170bccd2b0094cac45181fa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 deb0e3526170bccd2b0094cac45181fa.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 deb0e3526170bccd2b0094cac45181fa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2100 deb0e3526170bccd2b0094cac45181fa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2100 deb0e3526170bccd2b0094cac45181fa.exe 3008 deb0e3526170bccd2b0094cac45181fa.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3008 2100 deb0e3526170bccd2b0094cac45181fa.exe 29 PID 2100 wrote to memory of 3008 2100 deb0e3526170bccd2b0094cac45181fa.exe 29 PID 2100 wrote to memory of 3008 2100 deb0e3526170bccd2b0094cac45181fa.exe 29 PID 2100 wrote to memory of 3008 2100 deb0e3526170bccd2b0094cac45181fa.exe 29 PID 3008 wrote to memory of 1444 3008 deb0e3526170bccd2b0094cac45181fa.exe 30 PID 3008 wrote to memory of 1444 3008 deb0e3526170bccd2b0094cac45181fa.exe 30 PID 3008 wrote to memory of 1444 3008 deb0e3526170bccd2b0094cac45181fa.exe 30 PID 3008 wrote to memory of 1444 3008 deb0e3526170bccd2b0094cac45181fa.exe 30 PID 3008 wrote to memory of 2532 3008 deb0e3526170bccd2b0094cac45181fa.exe 32 PID 3008 wrote to memory of 2532 3008 deb0e3526170bccd2b0094cac45181fa.exe 32 PID 3008 wrote to memory of 2532 3008 deb0e3526170bccd2b0094cac45181fa.exe 32 PID 3008 wrote to memory of 2532 3008 deb0e3526170bccd2b0094cac45181fa.exe 32 PID 2532 wrote to memory of 2788 2532 cmd.exe 34 PID 2532 wrote to memory of 2788 2532 cmd.exe 34 PID 2532 wrote to memory of 2788 2532 cmd.exe 34 PID 2532 wrote to memory of 2788 2532 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\deb0e3526170bccd2b0094cac45181fa.exe"C:\Users\Admin\AppData\Local\Temp\deb0e3526170bccd2b0094cac45181fa.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\deb0e3526170bccd2b0094cac45181fa.exeC:\Users\Admin\AppData\Local\Temp\deb0e3526170bccd2b0094cac45181fa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\deb0e3526170bccd2b0094cac45181fa.exe" /TN WiDkBlJDe41e /F3⤵
- Creates scheduled task(s)
PID:1444
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN WiDkBlJDe41e > C:\Users\Admin\AppData\Local\Temp\Z8XVT9rQ.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN WiDkBlJDe41e4⤵PID:2788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59e456df135f65f10bca1edad8c2d6729
SHA196697d3defff5fa160739666fc0cec2f6b1fdb50
SHA256c204e61a514a4a230ff6c17d38a1cfd763a2b5efe4e1be4464ee4f2fafbe3b36
SHA512fe25e660099edf614846833b3e20a876b6f8cd2c08153d6195f76c34ab0f40fed2b513ffcb084e5c6e914b53d5ae1a3bac1461aeea3e278dca728dc18abdb832
-
Filesize
3.9MB
MD590ad569d9546d016d7691fe0af5e1732
SHA1852bd55a55217a1a7801f4b6a10a16494403dac9
SHA256ea1e1595e3e77c02f01e89fba1eaeb4a3d626c6794631a9ba19311a7fba8cdb9
SHA51242daf8c968b0607836b720054c41b458657b54678e375abd94ea6718f3a05ee8f0e87e46cdbac14b98d347073285ccdbd73c68c72d4d0071beffe1bef8ea5ba6