Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe
Resource
win10v2004-20220812-en
General
-
Target
24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe
-
Size
414KB
-
MD5
af30f071234a0b12342f6f40ca61f01c
-
SHA1
0809efdfce74643f09ef788d1b26bb4e8d472f65
-
SHA256
24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4
-
SHA512
79adecf6a216583a5b7a9e4e0b50af07f0d0bf08f4de6db4b0c292ad7daff4d3c2a089b5d460b4b12af3753604af15223c76f5cb20e06b5486b855e61d448916
-
SSDEEP
6144:s5CFwkhdy8ly0ZYv59234BBWDoP1e6A8uCJsaE+N8PVT5BcOsg:k+wUdyjEYv592IADoP13uJ4YBB5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1336 odypek.exe -
Deletes itself 1 IoCs
pid Process 432 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run odypek.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Axosko\\odypek.exe" odypek.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe 1336 odypek.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 1336 odypek.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1336 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 26 PID 1504 wrote to memory of 1336 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 26 PID 1504 wrote to memory of 1336 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 26 PID 1504 wrote to memory of 1336 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 26 PID 1336 wrote to memory of 1260 1336 odypek.exe 17 PID 1336 wrote to memory of 1260 1336 odypek.exe 17 PID 1336 wrote to memory of 1260 1336 odypek.exe 17 PID 1336 wrote to memory of 1260 1336 odypek.exe 17 PID 1336 wrote to memory of 1260 1336 odypek.exe 17 PID 1336 wrote to memory of 1344 1336 odypek.exe 11 PID 1336 wrote to memory of 1344 1336 odypek.exe 11 PID 1336 wrote to memory of 1344 1336 odypek.exe 11 PID 1336 wrote to memory of 1344 1336 odypek.exe 11 PID 1336 wrote to memory of 1344 1336 odypek.exe 11 PID 1336 wrote to memory of 1396 1336 odypek.exe 16 PID 1336 wrote to memory of 1396 1336 odypek.exe 16 PID 1336 wrote to memory of 1396 1336 odypek.exe 16 PID 1336 wrote to memory of 1396 1336 odypek.exe 16 PID 1336 wrote to memory of 1396 1336 odypek.exe 16 PID 1336 wrote to memory of 1504 1336 odypek.exe 25 PID 1336 wrote to memory of 1504 1336 odypek.exe 25 PID 1336 wrote to memory of 1504 1336 odypek.exe 25 PID 1336 wrote to memory of 1504 1336 odypek.exe 25 PID 1336 wrote to memory of 1504 1336 odypek.exe 25 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27 PID 1504 wrote to memory of 432 1504 24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe 27
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1344
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe"C:\Users\Admin\AppData\Local\Temp\24ebf6413d2c444c65f20691264afa0f2c2bc40d3dd5f9a5d6444cd8979cebe4.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\Axosko\odypek.exe"C:\Users\Admin\AppData\Roaming\Axosko\odypek.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6ad5e49a.bat"3⤵
- Deletes itself
PID:432
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD58242bfd202172370e70652eabd093863
SHA17220f4dbd18ec03346e7dc48004c20096f12adac
SHA2562d7cf3082d2738e955212b06c8f10a9c637a8587b757a43a434e7cf0f53806b8
SHA512f6986f65f6757576b26a3e683b295ef9041366ce2604a35f8b5431139987470bfd6075a26fbeef06c83bf1d8ae21e5f849913ca0a6a2fb285cc4277fc611a1b8
-
Filesize
414KB
MD58d1df0a0be568d51083f5643d44adcf1
SHA1cc357bf9cc6312ec15c0090e4c2c82ce49a02ff8
SHA256d1971184f866302ca7cb904fe011bf7a65307a6c88642667cb76f764c6f0307a
SHA512c34bbde3c534f4dcb285a6593dc76d153e0de4f39f7afa216b2eea8aaefe614503f65559a00cdd164c560e96f753b77636f099c29fd103e13dd2d4f5d671980c
-
Filesize
414KB
MD58d1df0a0be568d51083f5643d44adcf1
SHA1cc357bf9cc6312ec15c0090e4c2c82ce49a02ff8
SHA256d1971184f866302ca7cb904fe011bf7a65307a6c88642667cb76f764c6f0307a
SHA512c34bbde3c534f4dcb285a6593dc76d153e0de4f39f7afa216b2eea8aaefe614503f65559a00cdd164c560e96f753b77636f099c29fd103e13dd2d4f5d671980c
-
Filesize
414KB
MD58d1df0a0be568d51083f5643d44adcf1
SHA1cc357bf9cc6312ec15c0090e4c2c82ce49a02ff8
SHA256d1971184f866302ca7cb904fe011bf7a65307a6c88642667cb76f764c6f0307a
SHA512c34bbde3c534f4dcb285a6593dc76d153e0de4f39f7afa216b2eea8aaefe614503f65559a00cdd164c560e96f753b77636f099c29fd103e13dd2d4f5d671980c
-
Filesize
414KB
MD58d1df0a0be568d51083f5643d44adcf1
SHA1cc357bf9cc6312ec15c0090e4c2c82ce49a02ff8
SHA256d1971184f866302ca7cb904fe011bf7a65307a6c88642667cb76f764c6f0307a
SHA512c34bbde3c534f4dcb285a6593dc76d153e0de4f39f7afa216b2eea8aaefe614503f65559a00cdd164c560e96f753b77636f099c29fd103e13dd2d4f5d671980c