Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe
Resource
win10v2004-20220812-en
General
-
Target
7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe
-
Size
308KB
-
MD5
66670fefc04ddda430e21aa9f27a5300
-
SHA1
2a9b8660744e46bc7321cd9d2e6dda0c91027020
-
SHA256
7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171
-
SHA512
4d2447faf12b5439024fac1281471380c646c3981f6fd994e348397cacadf638fbb7005436aba8092626cd4e52b67ceca8aa5f7c7ec77f95bdb05202f7abd7fe
-
SSDEEP
6144:ec9QEcP+wbqVovb83oyN1waZ2Wszxrdi+nrPMToy9xVJB9ld:/9QbJb0onyNaaZ2/1BrksyTVjn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1508 ywcua.exe -
Deletes itself 1 IoCs
pid Process 1880 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run ywcua.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ywcua = "C:\\Users\\Admin\\AppData\\Roaming\\Eblesu\\ywcua.exe" ywcua.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1556 set thread context of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe 1508 ywcua.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1556 wrote to memory of 1508 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 27 PID 1556 wrote to memory of 1508 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 27 PID 1556 wrote to memory of 1508 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 27 PID 1556 wrote to memory of 1508 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 27 PID 1508 wrote to memory of 1124 1508 ywcua.exe 8 PID 1508 wrote to memory of 1124 1508 ywcua.exe 8 PID 1508 wrote to memory of 1124 1508 ywcua.exe 8 PID 1508 wrote to memory of 1124 1508 ywcua.exe 8 PID 1508 wrote to memory of 1124 1508 ywcua.exe 8 PID 1508 wrote to memory of 1232 1508 ywcua.exe 15 PID 1508 wrote to memory of 1232 1508 ywcua.exe 15 PID 1508 wrote to memory of 1232 1508 ywcua.exe 15 PID 1508 wrote to memory of 1232 1508 ywcua.exe 15 PID 1508 wrote to memory of 1232 1508 ywcua.exe 15 PID 1508 wrote to memory of 1288 1508 ywcua.exe 14 PID 1508 wrote to memory of 1288 1508 ywcua.exe 14 PID 1508 wrote to memory of 1288 1508 ywcua.exe 14 PID 1508 wrote to memory of 1288 1508 ywcua.exe 14 PID 1508 wrote to memory of 1288 1508 ywcua.exe 14 PID 1508 wrote to memory of 1556 1508 ywcua.exe 16 PID 1508 wrote to memory of 1556 1508 ywcua.exe 16 PID 1508 wrote to memory of 1556 1508 ywcua.exe 16 PID 1508 wrote to memory of 1556 1508 ywcua.exe 16 PID 1508 wrote to memory of 1556 1508 ywcua.exe 16 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28 PID 1556 wrote to memory of 1880 1556 7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe"C:\Users\Admin\AppData\Local\Temp\7733dadd4cd3b77ac1e5197bc33657e2dd7be2faffffbcfd0e772403152d9171.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Roaming\Eblesu\ywcua.exe"C:\Users\Admin\AppData\Roaming\Eblesu\ywcua.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\PPN899E.bat"3⤵
- Deletes itself
PID:1880
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD58ae9670a54fb90e926fcbe9407623321
SHA1522f4d821affb7c1923fb99b5188cc79ee4bf493
SHA25648cfe6781209d1a5ce5ed38e1f1acaf4821b8b20c59ced492962eefbc77760a7
SHA512110b8851938949f02596284b91539778d26b036d79f2a1bb447164000a4f7886e8eb877ec73ea26f330f1913b68b40a177f51399b804688b8f4aafc0c2781fad
-
Filesize
308KB
MD5141a961d008169b1e363aa0567275d7d
SHA1b57b70af03902aef6897478f7aa86f478a5ec4be
SHA2560327be4c46a8ba807fbba637adad0de6df5d3a91ce8aeaac1985f4282dc279e5
SHA512c7077760f215d6b52f8090b7a02f0a60345a3aa4a5f85ddb66a15d0716c81f21627c510a5d7afff473978f37a4fb06130f60e1b10807b13b79af326f27eec09c
-
Filesize
308KB
MD5141a961d008169b1e363aa0567275d7d
SHA1b57b70af03902aef6897478f7aa86f478a5ec4be
SHA2560327be4c46a8ba807fbba637adad0de6df5d3a91ce8aeaac1985f4282dc279e5
SHA512c7077760f215d6b52f8090b7a02f0a60345a3aa4a5f85ddb66a15d0716c81f21627c510a5d7afff473978f37a4fb06130f60e1b10807b13b79af326f27eec09c
-
Filesize
308KB
MD5141a961d008169b1e363aa0567275d7d
SHA1b57b70af03902aef6897478f7aa86f478a5ec4be
SHA2560327be4c46a8ba807fbba637adad0de6df5d3a91ce8aeaac1985f4282dc279e5
SHA512c7077760f215d6b52f8090b7a02f0a60345a3aa4a5f85ddb66a15d0716c81f21627c510a5d7afff473978f37a4fb06130f60e1b10807b13b79af326f27eec09c
-
Filesize
308KB
MD5141a961d008169b1e363aa0567275d7d
SHA1b57b70af03902aef6897478f7aa86f478a5ec4be
SHA2560327be4c46a8ba807fbba637adad0de6df5d3a91ce8aeaac1985f4282dc279e5
SHA512c7077760f215d6b52f8090b7a02f0a60345a3aa4a5f85ddb66a15d0716c81f21627c510a5d7afff473978f37a4fb06130f60e1b10807b13b79af326f27eec09c