Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/03/2024, 23:50

240323-3vttmsed88 10

12/12/2020, 10:26

201212-wddwj75xse 10

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12/12/2020, 10:26

General

  • Target

    301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe

  • Size

    413KB

  • MD5

    3023d7526b479ea3df315a5b1779a43d

  • SHA1

    b5ae71b96a28b9353a4f33c5370ac18750937c17

  • SHA256

    301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f

  • SHA512

    67fe1cf7538e8ef76b6acbba99326af0de58464bf5710ae6fa7b85d73da9a84c58122de6b87c7d9560f0d366de711a95d03be231c1018eacb7489fd32aeb0834

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 7 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 87 IoCs
  • Suspicious use of UnmapMainImage 3 IoCs
  • Suspicious use of WriteProcessMemory 150 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:372
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:464
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
            3⤵
            • Modifies security service
            • Drops file in System32 directory
            • Modifies Internet Explorer settings
            PID:740
            • C:\Windows\system32\AUDIODG.EXE
              C:\Windows\system32\AUDIODG.EXE 0x454
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1552
          • C:\Windows\system32\taskhost.exe
            "taskhost.exe"
            3⤵
            • Suspicious use of FindShellTrayWindow
            PID:1120
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
            3⤵
              PID:1044
            • C:\Windows\System32\spoolsv.exe
              C:\Windows\System32\spoolsv.exe
              3⤵
                PID:344
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k NetworkService
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:280
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs
                3⤵
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                PID:884
                • C:\Windows\system32\wbem\WMIADAP.EXE
                  wmiadap.exe /F /T /R
                  4⤵
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  PID:2004
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalService
                3⤵
                  PID:848
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                  3⤵
                  • Suspicious use of UnmapMainImage
                  PID:804
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k RPCSS
                  3⤵
                    PID:668
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k DcomLaunch
                    3⤵
                      PID:588
                      • C:\Windows\system32\wbem\wmiprvse.exe
                        C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1972
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                        4⤵
                          PID:1528
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                        3⤵
                          PID:1720
                        • C:\Windows\system32\sppsvc.exe
                          C:\Windows\system32\sppsvc.exe
                          3⤵
                          • Drops file in Windows directory
                          PID:1700
                      • C:\Windows\system32\lsass.exe
                        C:\Windows\system32\lsass.exe
                        2⤵
                          PID:480
                        • C:\Windows\system32\lsm.exe
                          C:\Windows\system32\lsm.exe
                          2⤵
                            PID:488
                        • C:\Windows\system32\csrss.exe
                          %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                          1⤵
                            PID:336
                          • C:\Windows\System32\smss.exe
                            \SystemRoot\System32\smss.exe
                            1⤵
                            • Suspicious use of UnmapMainImage
                            PID:260
                          • C:\Windows\system32\csrss.exe
                            %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                            1⤵
                            • Suspicious use of WriteProcessMemory
                            PID:384
                            • C:\Windows\system32\conhost.exe
                              \??\C:\Windows\system32\conhost.exe "-19469759681828169204475764091889446052-13638994091282863585-8226182722046354872"
                              2⤵
                                PID:600
                            • C:\Windows\system32\winlogon.exe
                              winlogon.exe
                              1⤵
                                PID:420
                              • C:\Windows\Explorer.EXE
                                C:\Windows\Explorer.EXE
                                1⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1256
                                • C:\Users\Admin\AppData\Local\Temp\301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe
                                  "C:\Users\Admin\AppData\Local\Temp\301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe"
                                  2⤵
                                  • Modifies WinLogon for persistence
                                  • Adds Run key to start application
                                  • Suspicious behavior: MapViewOfSection
                                  • Suspicious use of WriteProcessMemory
                                  PID:1080
                                  • C:\Windows\syswow64\svchost.exe
                                    C:\Windows\syswow64\svchost.exe
                                    3⤵
                                    • Adds Run key to start application
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: MapViewOfSection
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of WriteProcessMemory
                                    PID:316
                                    • C:\Windows\syswow64\svchost.exe
                                      C:\Windows\syswow64\svchost.exe
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1680
                                  • C:\Windows\syswow64\svchost.exe
                                    C:\Windows\syswow64\svchost.exe
                                    3⤵
                                      PID:1152
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\J8Oqe3qMF.bat" 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe"
                                      3⤵
                                      • Deletes itself
                                      • Suspicious use of WriteProcessMemory
                                      PID:1584
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib -r -s -h 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.sample.exe
                                        4⤵
                                        • Views/modifies file attributes
                                        PID:1232
                                  • C:\Windows\system32\WerFault.exe
                                    C:\Windows\system32\WerFault.exe -u -p 1256 -s 1488
                                    2⤵
                                    • Program crash
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:548
                                    • C:\Windows\Explorer.EXE
                                      "C:\Windows\Explorer.EXE"
                                      3⤵
                                      • Drops file in Windows directory
                                      • Modifies registry class
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:1980
                                      • C:\ProgramData\ejaqv\bobpd.exe
                                        "C:\ProgramData\ejaqv\bobpd.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        PID:1428
                                • C:\Windows\system32\Dwm.exe
                                  "C:\Windows\system32\Dwm.exe"
                                  1⤵
                                    PID:1188

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • memory/260-8-0x0000000000110000-0x0000000000160000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/316-89-0x0000000000230000-0x0000000000231000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/316-90-0x00000000002F0000-0x0000000000300000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/316-57-0x0000000000300000-0x000000000030F000-memory.dmp

                                    Filesize

                                    60KB

                                  • memory/316-4-0x0000000000930000-0x0000000000938000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/384-116-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/384-77-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/384-127-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/384-120-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/384-132-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/384-105-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/384-73-0x00000000003C0000-0x00000000003C1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/384-82-0x00000000003C0000-0x00000000003C1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/384-94-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/548-75-0x0000000001F70000-0x0000000001F81000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/548-78-0x0000000002AF0000-0x0000000002B01000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/548-76-0x0000000002AF0000-0x0000000002B01000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/1080-59-0x00000000001A0000-0x00000000001A8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/1080-58-0x00000000001B0000-0x00000000001EF000-memory.dmp

                                    Filesize

                                    252KB

                                  • memory/1080-2-0x0000000000290000-0x00000000002D0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/1428-86-0x0000000000180000-0x00000000001C0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/1680-6-0x0000000000930000-0x0000000000938000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/1980-81-0x0000000002C10000-0x0000000002C12000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-125-0x0000000005280000-0x0000000005282000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-104-0x0000000004CD0000-0x0000000004CD2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-91-0x00000000049C0000-0x0000000004A61000-memory.dmp

                                    Filesize

                                    644KB

                                  • memory/1980-106-0x0000000004CE0000-0x0000000004CE2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-109-0x0000000005020000-0x0000000005023000-memory.dmp

                                    Filesize

                                    12KB

                                  • memory/1980-112-0x0000000004CD0000-0x0000000004CD2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-107-0x0000000004CE0000-0x0000000004CE2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-117-0x0000000004CD0000-0x0000000004CD2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-114-0x0000000005030000-0x0000000005032000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-121-0x0000000004CE0000-0x0000000004CE2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-123-0x0000000005020000-0x0000000005023000-memory.dmp

                                    Filesize

                                    12KB

                                  • memory/1980-96-0x0000000004CD0000-0x0000000004CD2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-124-0x0000000005040000-0x0000000005043000-memory.dmp

                                    Filesize

                                    12KB

                                  • memory/1980-122-0x0000000004CD0000-0x0000000004CD2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-95-0x0000000004CD0000-0x0000000004CD2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-93-0x00000000043C0000-0x00000000043C2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-128-0x0000000005020000-0x0000000005023000-memory.dmp

                                    Filesize

                                    12KB

                                  • memory/1980-92-0x0000000004870000-0x0000000004872000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-133-0x0000000004CE0000-0x0000000004CE2000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-135-0x0000000005390000-0x0000000005392000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-138-0x0000000005030000-0x0000000005032000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1980-141-0x0000000005020000-0x0000000005023000-memory.dmp

                                    Filesize

                                    12KB

                                  • memory/1980-144-0x0000000004CE0000-0x0000000004CE2000-memory.dmp

                                    Filesize

                                    8KB