Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 01:19
Behavioral task
behavioral1
Sample
1c39392a58481100d12051fdddea9a60N.exe
Resource
win7-20240708-en
General
-
Target
1c39392a58481100d12051fdddea9a60N.exe
-
Size
1.5MB
-
MD5
1c39392a58481100d12051fdddea9a60
-
SHA1
347eb2869db08ee40aa7e5eacf87da849bca1900
-
SHA256
c413ab5eeeeba7514c998bd8a07b24c3ad8dbf1c4ec3119ea9d4f17c5c7b9aff
-
SHA512
d40b75638f19df2e63be6184e5acf1e168aeeaa00dd3c45fd80d8742c28d4fbdb9b0919dd2dbe785619ae81455eb9f7217ee4d1ac5d7b6e61c17eadd334aa3fb
-
SSDEEP
24576:ceWroXdm0DSBoN1cjukL24eXyK1okOXdRu8N5nEcjukL2Y:ceIoXdRaoN1cakLfeXyKLOXdRu8N5nEy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2144 1c39392a58481100d12051fdddea9a60N.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 1c39392a58481100d12051fdddea9a60N.exe -
Loads dropped DLL 1 IoCs
pid Process 2152 1c39392a58481100d12051fdddea9a60N.exe -
resource yara_rule behavioral1/memory/2152-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x00090000000120f8-11.dat upx behavioral1/memory/2152-16-0x0000000022F90000-0x00000000231EC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c39392a58481100d12051fdddea9a60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c39392a58481100d12051fdddea9a60N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2284 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2152 1c39392a58481100d12051fdddea9a60N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2152 1c39392a58481100d12051fdddea9a60N.exe 2144 1c39392a58481100d12051fdddea9a60N.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2144 2152 1c39392a58481100d12051fdddea9a60N.exe 31 PID 2152 wrote to memory of 2144 2152 1c39392a58481100d12051fdddea9a60N.exe 31 PID 2152 wrote to memory of 2144 2152 1c39392a58481100d12051fdddea9a60N.exe 31 PID 2152 wrote to memory of 2144 2152 1c39392a58481100d12051fdddea9a60N.exe 31 PID 2144 wrote to memory of 2284 2144 1c39392a58481100d12051fdddea9a60N.exe 32 PID 2144 wrote to memory of 2284 2144 1c39392a58481100d12051fdddea9a60N.exe 32 PID 2144 wrote to memory of 2284 2144 1c39392a58481100d12051fdddea9a60N.exe 32 PID 2144 wrote to memory of 2284 2144 1c39392a58481100d12051fdddea9a60N.exe 32 PID 2144 wrote to memory of 1784 2144 1c39392a58481100d12051fdddea9a60N.exe 34 PID 2144 wrote to memory of 1784 2144 1c39392a58481100d12051fdddea9a60N.exe 34 PID 2144 wrote to memory of 1784 2144 1c39392a58481100d12051fdddea9a60N.exe 34 PID 2144 wrote to memory of 1784 2144 1c39392a58481100d12051fdddea9a60N.exe 34 PID 1784 wrote to memory of 2736 1784 cmd.exe 36 PID 1784 wrote to memory of 2736 1784 cmd.exe 36 PID 1784 wrote to memory of 2736 1784 cmd.exe 36 PID 1784 wrote to memory of 2736 1784 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c39392a58481100d12051fdddea9a60N.exe"C:\Users\Admin\AppData\Local\Temp\1c39392a58481100d12051fdddea9a60N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\1c39392a58481100d12051fdddea9a60N.exeC:\Users\Admin\AppData\Local\Temp\1c39392a58481100d12051fdddea9a60N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1c39392a58481100d12051fdddea9a60N.exe" /TN Mk5F3CJT08f3 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2284
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN Mk5F3CJT08f3 > C:\Users\Admin\AppData\Local\Temp\PWdKU.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN Mk5F3CJT08f34⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57079a8b4d6e1a1d74f1ce8ae776553ac
SHA163b6f0115cd308c6eb30d34aac3682f62ec9d7b3
SHA256a162b61b3fbb141c7c1f0862c9c09943f88c4bcee7e75b2d34ecd3a36d559bd4
SHA51279ec332013e705ccc70fbd3e265ccb2bd66ca230ff74161748bf776b4bce9104c5afd22453ffdf1b69cdfab6c47553922e8e95dbfa27383fa619181cb5bbb06c
-
Filesize
1.5MB
MD55bedeace5e90e9ea82b996d9e241a2eb
SHA1d7de6b8ab9e57bf0f343cdf2e617b41465f85b0c
SHA25658f8a8f1500979f9fdc199e6b19f1ebba4905dbe2ca68837b80a088e70d0c402
SHA512523bf346d3784088bdd60f099103033520d99634ffb34c85203aa81ecb75f9217cd3904347ee7323a23ccacc720436adc74a03d6b7a616e695768cfa33d94bce