Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
301s -
max time network
291s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/09/2022, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe
Resource
win10-20220812-en
General
-
Target
517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe
-
Size
72KB
-
MD5
cbd413acc2ea9f241888e7e735b1ffee
-
SHA1
17c6239d14f8d78e45158e982494c910bc1aeeda
-
SHA256
517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc
-
SHA512
79985342269e514301040b502648d3dc6a9a4e020036ba82e898d8cdeeafa208227ad99b6850fa338cfb6f2d79e1fb79234e79bd0ff97dab83966407fcfc0f29
-
SSDEEP
1536:Ori+Y9uzEJnM7n9aLf8n7j8zbr2Iout+NE8EXra:OhY9VMLI8n7Izbr2Iout+NiO
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000001ae67-1133.dat xmrig behavioral2/files/0x000700000001ae67-1134.dat xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4260 dllhost.exe 4244 winlogson.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe 1528 schtasks.exe 3984 schtasks.exe 2832 schtasks.exe 2704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4192 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 784 powershell.exe 784 powershell.exe 784 powershell.exe 3664 powershell.exe 3664 powershell.exe 3664 powershell.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe 4260 dllhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 644 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4192 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe Token: SeDebugPrivilege 784 powershell.exe Token: SeDebugPrivilege 3664 powershell.exe Token: SeDebugPrivilege 4260 dllhost.exe Token: SeLockMemoryPrivilege 4244 winlogson.exe Token: SeLockMemoryPrivilege 4244 winlogson.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4244 winlogson.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 1396 4192 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 68 PID 4192 wrote to memory of 1396 4192 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 68 PID 4192 wrote to memory of 1396 4192 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 68 PID 1396 wrote to memory of 4872 1396 cmd.exe 70 PID 1396 wrote to memory of 4872 1396 cmd.exe 70 PID 1396 wrote to memory of 4872 1396 cmd.exe 70 PID 1396 wrote to memory of 784 1396 cmd.exe 71 PID 1396 wrote to memory of 784 1396 cmd.exe 71 PID 1396 wrote to memory of 784 1396 cmd.exe 71 PID 1396 wrote to memory of 3664 1396 cmd.exe 72 PID 1396 wrote to memory of 3664 1396 cmd.exe 72 PID 1396 wrote to memory of 3664 1396 cmd.exe 72 PID 4192 wrote to memory of 4260 4192 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 73 PID 4192 wrote to memory of 4260 4192 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 73 PID 4192 wrote to memory of 4260 4192 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 73 PID 4260 wrote to memory of 4332 4260 dllhost.exe 74 PID 4260 wrote to memory of 4332 4260 dllhost.exe 74 PID 4260 wrote to memory of 4332 4260 dllhost.exe 74 PID 4260 wrote to memory of 4996 4260 dllhost.exe 75 PID 4260 wrote to memory of 4996 4260 dllhost.exe 75 PID 4260 wrote to memory of 4996 4260 dllhost.exe 75 PID 4260 wrote to memory of 4364 4260 dllhost.exe 76 PID 4260 wrote to memory of 4364 4260 dllhost.exe 76 PID 4260 wrote to memory of 4364 4260 dllhost.exe 76 PID 4260 wrote to memory of 3884 4260 dllhost.exe 77 PID 4260 wrote to memory of 3884 4260 dllhost.exe 77 PID 4260 wrote to memory of 3884 4260 dllhost.exe 77 PID 4260 wrote to memory of 528 4260 dllhost.exe 78 PID 4260 wrote to memory of 528 4260 dllhost.exe 78 PID 4260 wrote to memory of 528 4260 dllhost.exe 78 PID 4260 wrote to memory of 1044 4260 dllhost.exe 79 PID 4260 wrote to memory of 1044 4260 dllhost.exe 79 PID 4260 wrote to memory of 1044 4260 dllhost.exe 79 PID 4260 wrote to memory of 4152 4260 dllhost.exe 81 PID 4260 wrote to memory of 4152 4260 dllhost.exe 81 PID 4260 wrote to memory of 4152 4260 dllhost.exe 81 PID 4260 wrote to memory of 1300 4260 dllhost.exe 83 PID 4260 wrote to memory of 1300 4260 dllhost.exe 83 PID 4260 wrote to memory of 1300 4260 dllhost.exe 83 PID 4260 wrote to memory of 3368 4260 dllhost.exe 86 PID 4260 wrote to memory of 3368 4260 dllhost.exe 86 PID 4260 wrote to memory of 3368 4260 dllhost.exe 86 PID 4260 wrote to memory of 3376 4260 dllhost.exe 87 PID 4260 wrote to memory of 3376 4260 dllhost.exe 87 PID 4260 wrote to memory of 3376 4260 dllhost.exe 87 PID 4260 wrote to memory of 160 4260 dllhost.exe 95 PID 4260 wrote to memory of 160 4260 dllhost.exe 95 PID 4260 wrote to memory of 160 4260 dllhost.exe 95 PID 4260 wrote to memory of 2220 4260 dllhost.exe 90 PID 4260 wrote to memory of 2220 4260 dllhost.exe 90 PID 4260 wrote to memory of 2220 4260 dllhost.exe 90 PID 3884 wrote to memory of 2704 3884 cmd.exe 98 PID 3884 wrote to memory of 2704 3884 cmd.exe 98 PID 3884 wrote to memory of 2704 3884 cmd.exe 98 PID 4332 wrote to memory of 2832 4332 cmd.exe 97 PID 4332 wrote to memory of 2832 4332 cmd.exe 97 PID 4332 wrote to memory of 2832 4332 cmd.exe 97 PID 3376 wrote to memory of 2824 3376 cmd.exe 99 PID 3376 wrote to memory of 2824 3376 cmd.exe 99 PID 3376 wrote to memory of 2824 3376 cmd.exe 99 PID 4152 wrote to memory of 1528 4152 cmd.exe 100 PID 4152 wrote to memory of 1528 4152 cmd.exe 100 PID 4152 wrote to memory of 1528 4152 cmd.exe 100 PID 3368 wrote to memory of 3984 3368 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe"C:\Users\Admin\AppData\Local\Temp\517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4872
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4996
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4364
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:528
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1044
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1300
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9318" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9318" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk204" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk204" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8125" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2826" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:160
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵PID:4676
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵PID:4204
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2520
-
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4244
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5867daf758e471cf769fd32fd29d9f492
SHA1c92a3fe10ccba22318a4d2b1dafc41f58dc46ab9
SHA2567377aa70b1775c0a5fd0ad6d274b2d9ce11e5a0a417eaca88924d619ab294054
SHA51296447dad486a55c0f2c4e6286e350e6557f00031f850c39cec38a127257bcda42910669a6b06fe02b747f3ffb59ee70f2bb535682735a5f084ed4f64570bf671
-
Filesize
80KB
MD5867daf758e471cf769fd32fd29d9f492
SHA1c92a3fe10ccba22318a4d2b1dafc41f58dc46ab9
SHA2567377aa70b1775c0a5fd0ad6d274b2d9ce11e5a0a417eaca88924d619ab294054
SHA51296447dad486a55c0f2c4e6286e350e6557f00031f850c39cec38a127257bcda42910669a6b06fe02b747f3ffb59ee70f2bb535682735a5f084ed4f64570bf671
-
Filesize
5.1MB
MD52a0d26b8b02bb2d17994d2a9a38d61db
SHA1889a9cb0a044c1f675e63ea6ea065a8cf914e2ab
SHA2563c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1
SHA51207245fb329b5fc9b68e1e88a52b7ab464bafd45442193e4b61cf6788ec0e10cdec2cfa2f59f49fe4a3f8a78a205d62ec0701a3b82a5e8f4257016821fee524ee
-
Filesize
5.1MB
MD52a0d26b8b02bb2d17994d2a9a38d61db
SHA1889a9cb0a044c1f675e63ea6ea065a8cf914e2ab
SHA2563c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1
SHA51207245fb329b5fc9b68e1e88a52b7ab464bafd45442193e4b61cf6788ec0e10cdec2cfa2f59f49fe4a3f8a78a205d62ec0701a3b82a5e8f4257016821fee524ee
-
Filesize
311B
MD5eced04709d59f36a68146129dd12b3c8
SHA117b5d51935398d0ed6e240dd304cecf3cda29299
SHA256d0ad369683b9fec5a4f947cd8b943d10b0b86c7c3fd6e7d4978949eac8dbb0fd
SHA512ffdd7647b39dc0b0e3a9e0e536c309d1519383e69d1cc52fd7aade3e8737bce761e3314e83c8b92441376d4b50c409bd27d2b2da017a3979514d8ef1eefda285
-
Filesize
1KB
MD519b0b20b6d51ad83568c89fa6b110407
SHA1ac17a7051b2b8a380c6376711c1925cd81b2fb20
SHA2564d49441abf46930296aca0f7f521bf94800d7c9dc65e49d649e7865491a64f3e
SHA512861f259e2f4c8a7f6da82b8b36f41f3581acc667c68e764e2079808312a5cf80e82efbad26e64a430e22e37b405c3706bd1c2798c32087df901255332df90107
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD52437f5dc71e03e26f6abfff5c8c7ea0b
SHA1f1ccdf51ddf5078bd308b1de7eca41a67f1b762c
SHA256ebe199e7f6d47d2480d68afe42efe445331c9c46bd9bff1d8e96bf57ac341f48
SHA5127d8fa86b8adaef66f2e2f6c9c591eafd07a4f524eb06a453342e3fe8f269e01888da164a293f954814395828b3c48c97ba266a2c9c03f55e46342aefb7111f15