Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe
Resource
win10v2004-20220812-en
General
-
Target
169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe
-
Size
310KB
-
MD5
5d6487ad4a77ff669cc2292d79dcb060
-
SHA1
71a9ac2c74777b9b36a3bea0543ba86a5dc00468
-
SHA256
169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d
-
SHA512
539621546849a19ef9c9ebb2efead9c8f11669503f8ab41b16b70367653a69058a3db61a7f43e431fd2003f2f69a40ca5b8ec069dc1aa03285ed1211e5ee1f9d
-
SSDEEP
6144:v8Q32/5jQ7TAN6nTi4WZy5smdxX7uJOt5dLFADkBmCzED:UQ3z769yR/X6kSDYzED
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 984 hiobic.exe -
Deletes itself 1 IoCs
pid Process 1368 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run hiobic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hiobic = "C:\\Users\\Admin\\AppData\\Roaming\\Gyyt\\hiobic.exe" hiobic.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe 984 hiobic.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2028 wrote to memory of 984 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 27 PID 2028 wrote to memory of 984 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 27 PID 2028 wrote to memory of 984 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 27 PID 2028 wrote to memory of 984 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 27 PID 984 wrote to memory of 1264 984 hiobic.exe 9 PID 984 wrote to memory of 1264 984 hiobic.exe 9 PID 984 wrote to memory of 1264 984 hiobic.exe 9 PID 984 wrote to memory of 1264 984 hiobic.exe 9 PID 984 wrote to memory of 1264 984 hiobic.exe 9 PID 984 wrote to memory of 1340 984 hiobic.exe 16 PID 984 wrote to memory of 1340 984 hiobic.exe 16 PID 984 wrote to memory of 1340 984 hiobic.exe 16 PID 984 wrote to memory of 1340 984 hiobic.exe 16 PID 984 wrote to memory of 1340 984 hiobic.exe 16 PID 984 wrote to memory of 1400 984 hiobic.exe 15 PID 984 wrote to memory of 1400 984 hiobic.exe 15 PID 984 wrote to memory of 1400 984 hiobic.exe 15 PID 984 wrote to memory of 1400 984 hiobic.exe 15 PID 984 wrote to memory of 1400 984 hiobic.exe 15 PID 984 wrote to memory of 2028 984 hiobic.exe 26 PID 984 wrote to memory of 2028 984 hiobic.exe 26 PID 984 wrote to memory of 2028 984 hiobic.exe 26 PID 984 wrote to memory of 2028 984 hiobic.exe 26 PID 984 wrote to memory of 2028 984 hiobic.exe 26 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28 PID 2028 wrote to memory of 1368 2028 169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1264
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe"C:\Users\Admin\AppData\Local\Temp\169826082eb73760c3100a4b6ea7376ce92ac088a1119e4bd6edfa5f65de535d.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\Gyyt\hiobic.exe"C:\Users\Admin\AppData\Roaming\Gyyt\hiobic.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:984
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf35b73f2.bat"3⤵
- Deletes itself
PID:1368
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5eb26876874d6f955cdd1be28b6661376
SHA1a38ff8eae3772035bd5b4d6d40c6aa1d01a322e2
SHA256beefdb6c41c7207091012a1e53f004008aadeeb1e88c84610fb7b35f0f3a2177
SHA512d46c741f4a2e82f42c29f39853b23bee33c0074d823b619d13b765cd21d559d55da5efd512640eb12d81d3906be395afaf3a7a5c6053bf7b9851fa208604690d
-
Filesize
310KB
MD5d23d20fd5380f0e34e7b0e92b66583f9
SHA1a6bf252b72195440c92cc434d100ae62c9cafc34
SHA2560a6c1d828de0f6b829c56b6bcd6238409274ce689e7f7619a4c293869695636a
SHA512f2a66ef00e599b2df5a31c8632c528a8f989f7b4d16d63ed1f813e9b939003f922176817569c7a0a6b98559c8c7f6fcf378cad94b5c878583507f76918071cd1
-
Filesize
310KB
MD5d23d20fd5380f0e34e7b0e92b66583f9
SHA1a6bf252b72195440c92cc434d100ae62c9cafc34
SHA2560a6c1d828de0f6b829c56b6bcd6238409274ce689e7f7619a4c293869695636a
SHA512f2a66ef00e599b2df5a31c8632c528a8f989f7b4d16d63ed1f813e9b939003f922176817569c7a0a6b98559c8c7f6fcf378cad94b5c878583507f76918071cd1
-
Filesize
310KB
MD5d23d20fd5380f0e34e7b0e92b66583f9
SHA1a6bf252b72195440c92cc434d100ae62c9cafc34
SHA2560a6c1d828de0f6b829c56b6bcd6238409274ce689e7f7619a4c293869695636a
SHA512f2a66ef00e599b2df5a31c8632c528a8f989f7b4d16d63ed1f813e9b939003f922176817569c7a0a6b98559c8c7f6fcf378cad94b5c878583507f76918071cd1
-
Filesize
310KB
MD5d23d20fd5380f0e34e7b0e92b66583f9
SHA1a6bf252b72195440c92cc434d100ae62c9cafc34
SHA2560a6c1d828de0f6b829c56b6bcd6238409274ce689e7f7619a4c293869695636a
SHA512f2a66ef00e599b2df5a31c8632c528a8f989f7b4d16d63ed1f813e9b939003f922176817569c7a0a6b98559c8c7f6fcf378cad94b5c878583507f76918071cd1