Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
24/01/2024, 07:29
240124-jbnczachd9 1023/01/2024, 11:54
240123-n2wjgsafc6 1026/06/2020, 08:43
200626-953qfplyej 10Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10_x64 -
resource
win10 -
submitted
26/06/2020, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
xiynk.dll
Resource
win7
0 signatures
0 seconds
General
-
Target
xiynk.dll
-
Size
356KB
-
MD5
e83a8a849188b48e79a6f49dd0c7ae91
-
SHA1
55a1669550d823104e1452f0e6a0a94c3f7fae12
-
SHA256
a97b7b2353dc9012b6cb914f6665d0e93f557859411d2e08b942316c09d7b07f
-
SHA512
b035faff865f72977879322f9d1c08c6f87c96a8805db76a0e5ae4b6118f2b075e58bb1cc6a9cee8ce1c51763301443bab40970ad1f072a1763d7d7727e477f4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3076 set thread context of 2116 3076 rundll32.exe 74 -
Blacklisted process makes network request 17 IoCs
flow pid Process 10 2116 msiexec.exe 11 2116 msiexec.exe 12 2116 msiexec.exe 13 2116 msiexec.exe 14 2116 msiexec.exe 15 2116 msiexec.exe 16 2116 msiexec.exe 17 2116 msiexec.exe 18 2116 msiexec.exe 19 2116 msiexec.exe 20 2116 msiexec.exe 21 2116 msiexec.exe 22 2116 msiexec.exe 23 2116 msiexec.exe 24 2116 msiexec.exe 25 2116 msiexec.exe 26 2116 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2116 msiexec.exe 2116 msiexec.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2532 wrote to memory of 3076 2532 rundll32.exe 67 PID 2532 wrote to memory of 3076 2532 rundll32.exe 67 PID 2532 wrote to memory of 3076 2532 rundll32.exe 67 PID 3076 wrote to memory of 2116 3076 rundll32.exe 74 PID 3076 wrote to memory of 2116 3076 rundll32.exe 74 PID 3076 wrote to memory of 2116 3076 rundll32.exe 74 PID 3076 wrote to memory of 2116 3076 rundll32.exe 74 PID 3076 wrote to memory of 2116 3076 rundll32.exe 74 PID 2116 wrote to memory of 492 2116 msiexec.exe 75 PID 2116 wrote to memory of 492 2116 msiexec.exe 75 PID 2116 wrote to memory of 492 2116 msiexec.exe 75 PID 492 wrote to memory of 848 492 cmd.exe 77 PID 492 wrote to memory of 848 492 cmd.exe 77 PID 492 wrote to memory of 848 492 cmd.exe 77 PID 2116 wrote to memory of 608 2116 msiexec.exe 78 PID 2116 wrote to memory of 608 2116 msiexec.exe 78 PID 2116 wrote to memory of 608 2116 msiexec.exe 78 PID 608 wrote to memory of 1168 608 cmd.exe 80 PID 608 wrote to memory of 1168 608 cmd.exe 80 PID 608 wrote to memory of 1168 608 cmd.exe 80 PID 1168 wrote to memory of 1356 1168 net.exe 81 PID 1168 wrote to memory of 1356 1168 net.exe 81 PID 1168 wrote to memory of 1356 1168 net.exe 81 PID 2116 wrote to memory of 1508 2116 msiexec.exe 82 PID 2116 wrote to memory of 1508 2116 msiexec.exe 82 PID 2116 wrote to memory of 1508 2116 msiexec.exe 82 PID 1508 wrote to memory of 1800 1508 cmd.exe 84 PID 1508 wrote to memory of 1800 1508 cmd.exe 84 PID 1508 wrote to memory of 1800 1508 cmd.exe 84 PID 2116 wrote to memory of 1880 2116 msiexec.exe 85 PID 2116 wrote to memory of 1880 2116 msiexec.exe 85 PID 2116 wrote to memory of 1880 2116 msiexec.exe 85 PID 1880 wrote to memory of 2128 1880 cmd.exe 87 PID 1880 wrote to memory of 2128 1880 cmd.exe 87 PID 1880 wrote to memory of 2128 1880 cmd.exe 87 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 2128 net.exe 1800 net.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2116 msiexec.exe Token: SeSecurityPrivilege 2116 msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\xiynk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\xiynk.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blacklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵PID:848
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\net.exenet config workstation5⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:1356
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:2128
-
-
-
-