Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe
Resource
win10v2004-20220901-en
General
-
Target
59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe
-
Size
312KB
-
MD5
e67af8a14a560669ea86c214b9290b47
-
SHA1
bd7a2cbc6b14b930089303558d499a7efc9591b4
-
SHA256
59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b
-
SHA512
e61a373dd7c5b302cb7532fd5ba69f85757dca00bf2cacdeb474bea286a922bfd8b3bfbac373ce3ea99a8b73b86bbd1689fdda7e2a5d9893d7ad85986e8f8a5c
-
SSDEEP
6144:iyJuBlo8GCyd1dUhAE74jvaG66xegV+/mJC63WoP+tN1JB5PKl:iwdjaUq6QgV+OvZPG175yl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1204 qequry.exe -
Deletes itself 1 IoCs
pid Process 1608 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run qequry.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Ehiby\\qequry.exe" qequry.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1424 set thread context of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe 1204 qequry.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 1204 qequry.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1204 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 26 PID 1424 wrote to memory of 1204 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 26 PID 1424 wrote to memory of 1204 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 26 PID 1424 wrote to memory of 1204 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 26 PID 1204 wrote to memory of 1148 1204 qequry.exe 15 PID 1204 wrote to memory of 1148 1204 qequry.exe 15 PID 1204 wrote to memory of 1148 1204 qequry.exe 15 PID 1204 wrote to memory of 1148 1204 qequry.exe 15 PID 1204 wrote to memory of 1148 1204 qequry.exe 15 PID 1204 wrote to memory of 1224 1204 qequry.exe 14 PID 1204 wrote to memory of 1224 1204 qequry.exe 14 PID 1204 wrote to memory of 1224 1204 qequry.exe 14 PID 1204 wrote to memory of 1224 1204 qequry.exe 14 PID 1204 wrote to memory of 1224 1204 qequry.exe 14 PID 1204 wrote to memory of 1260 1204 qequry.exe 11 PID 1204 wrote to memory of 1260 1204 qequry.exe 11 PID 1204 wrote to memory of 1260 1204 qequry.exe 11 PID 1204 wrote to memory of 1260 1204 qequry.exe 11 PID 1204 wrote to memory of 1260 1204 qequry.exe 11 PID 1204 wrote to memory of 1424 1204 qequry.exe 18 PID 1204 wrote to memory of 1424 1204 qequry.exe 18 PID 1204 wrote to memory of 1424 1204 qequry.exe 18 PID 1204 wrote to memory of 1424 1204 qequry.exe 18 PID 1204 wrote to memory of 1424 1204 qequry.exe 18 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27 PID 1424 wrote to memory of 1608 1424 59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe"C:\Users\Admin\AppData\Local\Temp\59bcf6ee89b2ca74fbb5e5a02aa49303a3cef5d0ab0c589c291cb4f9693b0c1b.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Roaming\Ehiby\qequry.exe"C:\Users\Admin\AppData\Roaming\Ehiby\qequry.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp26939393.bat"3⤵
- Deletes itself
PID:1608
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5f688330dd3912e3b327445677d875380
SHA183fbd80bf5d58e07f133fe1a76d072ea5f5ce9eb
SHA256a3b515848c95cd0b32d3bb4c58946f675e4d230263a97da292e141aa7e839d76
SHA512f77ee07a622c3dd432de0dedcc454403cc5601bfa9e0ed3bc100381d435845af5e2bda9df94f8308546091645e0fc4235c43184e2d2ddb8e878a4042948595b3
-
Filesize
312KB
MD5a8fdc1d801b24a9a17425acdfcb1db45
SHA141844286979893227047f21d1d26509494c35296
SHA25693b72e1977f9290d802d1ff3e6c06c3cedd0a56d05ba15044a458ff38658b57d
SHA51273b981854a2d007b3d24807276e800729417c6e4ca8ef7db3d3194abdf283536a893d6ceb2a2ecfa7e67befed08d2a1429d0567703e14b77a74820510b668e4c
-
Filesize
312KB
MD5a8fdc1d801b24a9a17425acdfcb1db45
SHA141844286979893227047f21d1d26509494c35296
SHA25693b72e1977f9290d802d1ff3e6c06c3cedd0a56d05ba15044a458ff38658b57d
SHA51273b981854a2d007b3d24807276e800729417c6e4ca8ef7db3d3194abdf283536a893d6ceb2a2ecfa7e67befed08d2a1429d0567703e14b77a74820510b668e4c
-
Filesize
312KB
MD5a8fdc1d801b24a9a17425acdfcb1db45
SHA141844286979893227047f21d1d26509494c35296
SHA25693b72e1977f9290d802d1ff3e6c06c3cedd0a56d05ba15044a458ff38658b57d
SHA51273b981854a2d007b3d24807276e800729417c6e4ca8ef7db3d3194abdf283536a893d6ceb2a2ecfa7e67befed08d2a1429d0567703e14b77a74820510b668e4c
-
Filesize
312KB
MD5a8fdc1d801b24a9a17425acdfcb1db45
SHA141844286979893227047f21d1d26509494c35296
SHA25693b72e1977f9290d802d1ff3e6c06c3cedd0a56d05ba15044a458ff38658b57d
SHA51273b981854a2d007b3d24807276e800729417c6e4ca8ef7db3d3194abdf283536a893d6ceb2a2ecfa7e67befed08d2a1429d0567703e14b77a74820510b668e4c