Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 19:35
Behavioral task
behavioral1
Sample
3ba042d477d1e2e38ffa8fd55cff7010N.exe
Resource
win7-20240903-en
General
-
Target
3ba042d477d1e2e38ffa8fd55cff7010N.exe
-
Size
6.4MB
-
MD5
3ba042d477d1e2e38ffa8fd55cff7010
-
SHA1
fbc009ab82ff3cf9d9e0c0f163df5f02af037ae1
-
SHA256
2c4bce1f47c63db8079ffe9a2f74e186dcd307c713c9e1bab8826f64d8bca66c
-
SHA512
cdcde0f01d7b2c7af8410523b27c7efe00ac7a5341f9aba7d7acf0cda05860dcc99eda5d2a6460b2ed87b691c27dc258d60c396de4cbd0905efeadca6795abbf
-
SSDEEP
196608:fz2dlVkHazkDKWTodlDnOz5dlVkHazkDKWTodlHq7n5dlVkHazkDKWTodlDnOz5K:fzMXeKWeOzDXeKWoqTDXeKWeOzDXeKWn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
resource yara_rule behavioral1/memory/2640-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2820-18-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012259-16.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ba042d477d1e2e38ffa8fd55cff7010N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ba042d477d1e2e38ffa8fd55cff7010N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2640 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2640 3ba042d477d1e2e38ffa8fd55cff7010N.exe 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2820 2640 3ba042d477d1e2e38ffa8fd55cff7010N.exe 32 PID 2640 wrote to memory of 2820 2640 3ba042d477d1e2e38ffa8fd55cff7010N.exe 32 PID 2640 wrote to memory of 2820 2640 3ba042d477d1e2e38ffa8fd55cff7010N.exe 32 PID 2640 wrote to memory of 2820 2640 3ba042d477d1e2e38ffa8fd55cff7010N.exe 32 PID 2820 wrote to memory of 2732 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe 33 PID 2820 wrote to memory of 2732 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe 33 PID 2820 wrote to memory of 2732 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe 33 PID 2820 wrote to memory of 2732 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe 33 PID 2820 wrote to memory of 2740 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe 35 PID 2820 wrote to memory of 2740 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe 35 PID 2820 wrote to memory of 2740 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe 35 PID 2820 wrote to memory of 2740 2820 3ba042d477d1e2e38ffa8fd55cff7010N.exe 35 PID 2740 wrote to memory of 2156 2740 cmd.exe 37 PID 2740 wrote to memory of 2156 2740 cmd.exe 37 PID 2740 wrote to memory of 2156 2740 cmd.exe 37 PID 2740 wrote to memory of 2156 2740 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exe"C:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exeC:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\3ba042d477d1e2e38ffa8fd55cff7010N.exe" /TN nI38xcyq74b0 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN nI38xcyq74b0 > C:\Users\Admin\AppData\Local\Temp\CAgJosvDO.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN nI38xcyq74b04⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD579551a78b067097fa0b5b6d42e54c17f
SHA1d22a384885a9a9a2079a25da8ef5ece17688540a
SHA256d261f0885079e849e1688babe998fa183d60709a2499b0cf79c69165d17ec88b
SHA5121b6fa4458e0d1cec360fdeb2a1b973c3416e071e5f1c9113b374ae52fe76cfc9a7256c2715834313254a2d74a2ea179f9313857f7352c995e8448aa80f7863f9
-
Filesize
1KB
MD5a26461bb4df2acbe6d1cba75bea90d91
SHA1558f5b2573a522f0a2cf5733870327a19aff397d
SHA256ca3edb1e001af5b23894d57630bf91e035e044757910ed93e46d984cfba26a9d
SHA51279e6c767271b889d6454202ac96f5f2edf5d3103addef34b47de48726343e37cc3aa81ca571207e4b509da12132a36bb58fdf20416af2458aa1a51a6c9b48dad