Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:23
Behavioral task
behavioral1
Sample
c8ac696891ef6fa944c0f8c6a15425e0N.exe
Resource
win7-20240903-en
General
-
Target
c8ac696891ef6fa944c0f8c6a15425e0N.exe
-
Size
3.0MB
-
MD5
c8ac696891ef6fa944c0f8c6a15425e0
-
SHA1
5a3e2cfe6729a771cf0958a990ae6b589e091823
-
SHA256
5574032ab2c7e1c520e7e045d7978eb2ad60862072070c53f533ee1417e0dced
-
SHA512
d605732de95945f98b3b8ea8711bef4b71e5839e694a76a51524a4484c8da92b43bf0db0dc3e6aafcb4e89e6914b3744735da98c929309d143ebcfcdb1ce15eb
-
SSDEEP
49152:OnhfBnKqmu4WmycakLVy5dv5sgpkB5+PcakLfqKby/RwkW9qcakLVy5dv5sgpkB/:OnhfBJmhWmycakhy595sgp9cakzqKbyM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 c8ac696891ef6fa944c0f8c6a15425e0N.exe -
resource yara_rule behavioral1/memory/2336-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2464-17-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x00080000000120f9-16.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8ac696891ef6fa944c0f8c6a15425e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8ac696891ef6fa944c0f8c6a15425e0N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2336 c8ac696891ef6fa944c0f8c6a15425e0N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2336 c8ac696891ef6fa944c0f8c6a15425e0N.exe 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2464 2336 c8ac696891ef6fa944c0f8c6a15425e0N.exe 31 PID 2336 wrote to memory of 2464 2336 c8ac696891ef6fa944c0f8c6a15425e0N.exe 31 PID 2336 wrote to memory of 2464 2336 c8ac696891ef6fa944c0f8c6a15425e0N.exe 31 PID 2336 wrote to memory of 2464 2336 c8ac696891ef6fa944c0f8c6a15425e0N.exe 31 PID 2464 wrote to memory of 2764 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe 32 PID 2464 wrote to memory of 2764 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe 32 PID 2464 wrote to memory of 2764 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe 32 PID 2464 wrote to memory of 2764 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe 32 PID 2464 wrote to memory of 2856 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe 34 PID 2464 wrote to memory of 2856 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe 34 PID 2464 wrote to memory of 2856 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe 34 PID 2464 wrote to memory of 2856 2464 c8ac696891ef6fa944c0f8c6a15425e0N.exe 34 PID 2856 wrote to memory of 2780 2856 cmd.exe 36 PID 2856 wrote to memory of 2780 2856 cmd.exe 36 PID 2856 wrote to memory of 2780 2856 cmd.exe 36 PID 2856 wrote to memory of 2780 2856 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8ac696891ef6fa944c0f8c6a15425e0N.exe"C:\Users\Admin\AppData\Local\Temp\c8ac696891ef6fa944c0f8c6a15425e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\c8ac696891ef6fa944c0f8c6a15425e0N.exeC:\Users\Admin\AppData\Local\Temp\c8ac696891ef6fa944c0f8c6a15425e0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c8ac696891ef6fa944c0f8c6a15425e0N.exe" /TN WGDPs5ow5411 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN WGDPs5ow5411 > C:\Users\Admin\AppData\Local\Temp\EO50skVJg.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN WGDPs5ow54114⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55de5969bc1e35a93c19c3cc6f8bb4d23
SHA1cc3f19e163abff35baa03a547369f51feb4b71e7
SHA256ca4aaca797d3faf23d466d664a6d21bf7f892aa40c9e9c40cd3717f705a7aa81
SHA512f20590194c0e06cc53072e6b1ba452b034bdceeaf06643f1cd7f045aeda5d52ef150550ab585f39f03c1541665bfa9d92d8834d53832b7d6fa0aac6df02f6f89
-
Filesize
3.0MB
MD5e1673f34e6d145594f4a3cb6d6913346
SHA1aac1770041d582d0fefe39559822eb2e4c49d302
SHA256d94a9a45bc361b21b55982dd547d35567fda9f308c14bc3992a77c3dd88ac0ac
SHA512eb75623589d0aa489ddba6afbfb142dd3f758d41e82f7ce17d1644d60d834bed416fe40be92bc1d31b603c5f9243072d47e3d927c56fc8b52fde0248f4e6e8d3