Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe
Resource
win10v2004-20220812-en
General
-
Target
f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe
-
Size
145KB
-
MD5
6e33de0e66f86ad3cb14ae10583a9bb6
-
SHA1
11d3b39fdb3cd8351f2cf6da02314bb5527de666
-
SHA256
f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036
-
SHA512
1607e399086d4d65bf0efb5db9cad52ac18199259df8cb0f323ddf97ecb7a7d181fea2354248ef4430014ad685ca866b7e9a7a5333305555b03e31f7a978bec0
-
SSDEEP
3072:4+P2674qzVSnst36u6ZWoPbY84LeQR/K9HBsHf916EEPz0BfR:fbkqzVgLhQINBsHfD6EEP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1548 zole.exe -
Deletes itself 1 IoCs
pid Process 556 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run zole.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{281EDA4A-5F4F-C00A-A092-97E0D743ED17} = "C:\\Users\\Admin\\AppData\\Roaming\\Uvawky\\zole.exe" zole.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 556 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 42 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\39EC1E90-00000001.eml:OECustomProperty WinMail.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe 1548 zole.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeSecurityPrivilege 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe Token: SeSecurityPrivilege 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe Token: SeSecurityPrivilege 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe Token: SeManageVolumePrivilege 1684 WinMail.exe Token: SeSecurityPrivilege 556 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1684 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1272 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 28 PID 1632 wrote to memory of 1272 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 28 PID 1632 wrote to memory of 1272 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 28 PID 1632 wrote to memory of 1272 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 28 PID 1272 wrote to memory of 2040 1272 net.exe 30 PID 1272 wrote to memory of 2040 1272 net.exe 30 PID 1272 wrote to memory of 2040 1272 net.exe 30 PID 1272 wrote to memory of 2040 1272 net.exe 30 PID 1632 wrote to memory of 1972 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 31 PID 1632 wrote to memory of 1972 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 31 PID 1632 wrote to memory of 1972 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 31 PID 1632 wrote to memory of 1972 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 31 PID 1972 wrote to memory of 1176 1972 net.exe 33 PID 1972 wrote to memory of 1176 1972 net.exe 33 PID 1972 wrote to memory of 1176 1972 net.exe 33 PID 1972 wrote to memory of 1176 1972 net.exe 33 PID 1632 wrote to memory of 1548 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 34 PID 1632 wrote to memory of 1548 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 34 PID 1632 wrote to memory of 1548 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 34 PID 1632 wrote to memory of 1548 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 34 PID 1548 wrote to memory of 892 1548 zole.exe 35 PID 1548 wrote to memory of 892 1548 zole.exe 35 PID 1548 wrote to memory of 892 1548 zole.exe 35 PID 1548 wrote to memory of 892 1548 zole.exe 35 PID 892 wrote to memory of 1472 892 net.exe 37 PID 892 wrote to memory of 1472 892 net.exe 37 PID 892 wrote to memory of 1472 892 net.exe 37 PID 892 wrote to memory of 1472 892 net.exe 37 PID 1548 wrote to memory of 1372 1548 zole.exe 38 PID 1548 wrote to memory of 1372 1548 zole.exe 38 PID 1548 wrote to memory of 1372 1548 zole.exe 38 PID 1548 wrote to memory of 1372 1548 zole.exe 38 PID 1548 wrote to memory of 1112 1548 zole.exe 10 PID 1548 wrote to memory of 1112 1548 zole.exe 10 PID 1548 wrote to memory of 1112 1548 zole.exe 10 PID 1548 wrote to memory of 1112 1548 zole.exe 10 PID 1548 wrote to memory of 1112 1548 zole.exe 10 PID 1548 wrote to memory of 1180 1548 zole.exe 9 PID 1548 wrote to memory of 1180 1548 zole.exe 9 PID 1548 wrote to memory of 1180 1548 zole.exe 9 PID 1548 wrote to memory of 1180 1548 zole.exe 9 PID 1548 wrote to memory of 1180 1548 zole.exe 9 PID 1548 wrote to memory of 1208 1548 zole.exe 8 PID 1548 wrote to memory of 1208 1548 zole.exe 8 PID 1372 wrote to memory of 1512 1372 net.exe 40 PID 1372 wrote to memory of 1512 1372 net.exe 40 PID 1372 wrote to memory of 1512 1372 net.exe 40 PID 1372 wrote to memory of 1512 1372 net.exe 40 PID 1548 wrote to memory of 1208 1548 zole.exe 8 PID 1548 wrote to memory of 1208 1548 zole.exe 8 PID 1548 wrote to memory of 1208 1548 zole.exe 8 PID 1548 wrote to memory of 1632 1548 zole.exe 27 PID 1548 wrote to memory of 1632 1548 zole.exe 27 PID 1548 wrote to memory of 1632 1548 zole.exe 27 PID 1548 wrote to memory of 1632 1548 zole.exe 27 PID 1548 wrote to memory of 1632 1548 zole.exe 27 PID 1548 wrote to memory of 1684 1548 zole.exe 41 PID 1548 wrote to memory of 1684 1548 zole.exe 41 PID 1548 wrote to memory of 1684 1548 zole.exe 41 PID 1548 wrote to memory of 1684 1548 zole.exe 41 PID 1548 wrote to memory of 1684 1548 zole.exe 41 PID 1632 wrote to memory of 556 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 42 PID 1632 wrote to memory of 556 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 42 PID 1632 wrote to memory of 556 1632 f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe 42
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe"C:\Users\Admin\AppData\Local\Temp\f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:2040
-
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1176
-
-
-
C:\Users\Admin\AppData\Roaming\Uvawky\zole.exe"C:\Users\Admin\AppData\Roaming\Uvawky\zole.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\net.exenet stop wscsvc4⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc5⤵PID:1472
-
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess4⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess5⤵PID:1512
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5fa81ffc.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1684
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:664
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD544f54cfd21f1ff1de381204fde730a2a
SHA1192d681a2de1a33e89a45680ead836068e204966
SHA2566c5742434fbe16a82871d64267fb3337febbfbbcc4efccd86485bfdaba379624
SHA51211915e830e4e972ea385947f859dc7be6a951f77879fcb881c32d3d236f05cd7f020eb24c7f058b9795ff70b7ad2adc92825d11c6ec278f60647f90a22df7398
-
Filesize
145KB
MD5c30f1f377a51d5dda1d65d6df767cbb8
SHA193194831447d40bbfb6a1b45f40479e5cf74336d
SHA256cb702f4c81fb5b87a33e9fcaf058d4151795aef849d61dfff864017974ea05a9
SHA5124a7a61154d31f673e3112d66ea16724f8f8ca4e8c2f44208e5e8107323bd16e3b8d86e6087b691c5c2f57b69f6c0ad5f2195b94540a96db49b82ba95d7a8816c
-
Filesize
145KB
MD5c30f1f377a51d5dda1d65d6df767cbb8
SHA193194831447d40bbfb6a1b45f40479e5cf74336d
SHA256cb702f4c81fb5b87a33e9fcaf058d4151795aef849d61dfff864017974ea05a9
SHA5124a7a61154d31f673e3112d66ea16724f8f8ca4e8c2f44208e5e8107323bd16e3b8d86e6087b691c5c2f57b69f6c0ad5f2195b94540a96db49b82ba95d7a8816c
-
Filesize
398B
MD56b0418217e9aa1b5792c79244de2df84
SHA1b6ff61633d7dd1cfbbca222766819a2c8962f2f6
SHA256d821ba6794fc8bf67ed3d6b02cccc16468efda461db646710eea01ea22f66c3e
SHA512524f04e14275a1ce6cc1d76c5fef2fbd706ccee0dc0c0a7c1b15efdc4d3b5e3ebe5d6b72e1f9292803aa6b5de0db5b144e5b698cca80d6332fdcbf14b6bf80a0
-
Filesize
145KB
MD5c30f1f377a51d5dda1d65d6df767cbb8
SHA193194831447d40bbfb6a1b45f40479e5cf74336d
SHA256cb702f4c81fb5b87a33e9fcaf058d4151795aef849d61dfff864017974ea05a9
SHA5124a7a61154d31f673e3112d66ea16724f8f8ca4e8c2f44208e5e8107323bd16e3b8d86e6087b691c5c2f57b69f6c0ad5f2195b94540a96db49b82ba95d7a8816c
-
Filesize
145KB
MD5c30f1f377a51d5dda1d65d6df767cbb8
SHA193194831447d40bbfb6a1b45f40479e5cf74336d
SHA256cb702f4c81fb5b87a33e9fcaf058d4151795aef849d61dfff864017974ea05a9
SHA5124a7a61154d31f673e3112d66ea16724f8f8ca4e8c2f44208e5e8107323bd16e3b8d86e6087b691c5c2f57b69f6c0ad5f2195b94540a96db49b82ba95d7a8816c