Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 08:19

General

  • Target

    f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe

  • Size

    145KB

  • MD5

    6e33de0e66f86ad3cb14ae10583a9bb6

  • SHA1

    11d3b39fdb3cd8351f2cf6da02314bb5527de666

  • SHA256

    f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036

  • SHA512

    1607e399086d4d65bf0efb5db9cad52ac18199259df8cb0f323ddf97ecb7a7d181fea2354248ef4430014ad685ca866b7e9a7a5333305555b03e31f7a978bec0

  • SSDEEP

    3072:4+P2674qzVSnst36u6ZWoPbY84LeQR/K9HBsHf916EEPz0BfR:fbkqzVgLhQINBsHfD6EEP

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe
        "C:\Users\Admin\AppData\Local\Temp\f620c12580e2a98b43dea03aaa0a099a7bb1cd236dc934805a63051b47904036.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Windows\SysWOW64\net.exe
          net stop wscsvc
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1272
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop wscsvc
            4⤵
              PID:2040
          • C:\Windows\SysWOW64\net.exe
            net stop SharedAccess
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1972
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop SharedAccess
              4⤵
                PID:1176
            • C:\Users\Admin\AppData\Roaming\Uvawky\zole.exe
              "C:\Users\Admin\AppData\Roaming\Uvawky\zole.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1548
              • C:\Windows\SysWOW64\net.exe
                net stop wscsvc
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:892
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop wscsvc
                  5⤵
                    PID:1472
                • C:\Windows\SysWOW64\net.exe
                  net stop SharedAccess
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1372
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop SharedAccess
                    5⤵
                      PID:1512
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5fa81ffc.bat"
                  3⤵
                  • Deletes itself
                  • Suspicious use of AdjustPrivilegeToken
                  PID:556
            • C:\Windows\system32\Dwm.exe
              "C:\Windows\system32\Dwm.exe"
              1⤵
                PID:1180
              • C:\Windows\system32\taskhost.exe
                "taskhost.exe"
                1⤵
                  PID:1112
                • C:\Program Files\Windows Mail\WinMail.exe
                  "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
                  1⤵
                  • NTFS ADS
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:1684
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:664
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:572

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\tmp5fa81ffc.bat

                      Filesize

                      307B

                      MD5

                      44f54cfd21f1ff1de381204fde730a2a

                      SHA1

                      192d681a2de1a33e89a45680ead836068e204966

                      SHA256

                      6c5742434fbe16a82871d64267fb3337febbfbbcc4efccd86485bfdaba379624

                      SHA512

                      11915e830e4e972ea385947f859dc7be6a951f77879fcb881c32d3d236f05cd7f020eb24c7f058b9795ff70b7ad2adc92825d11c6ec278f60647f90a22df7398

                    • C:\Users\Admin\AppData\Roaming\Uvawky\zole.exe

                      Filesize

                      145KB

                      MD5

                      c30f1f377a51d5dda1d65d6df767cbb8

                      SHA1

                      93194831447d40bbfb6a1b45f40479e5cf74336d

                      SHA256

                      cb702f4c81fb5b87a33e9fcaf058d4151795aef849d61dfff864017974ea05a9

                      SHA512

                      4a7a61154d31f673e3112d66ea16724f8f8ca4e8c2f44208e5e8107323bd16e3b8d86e6087b691c5c2f57b69f6c0ad5f2195b94540a96db49b82ba95d7a8816c

                    • C:\Users\Admin\AppData\Roaming\Uvawky\zole.exe

                      Filesize

                      145KB

                      MD5

                      c30f1f377a51d5dda1d65d6df767cbb8

                      SHA1

                      93194831447d40bbfb6a1b45f40479e5cf74336d

                      SHA256

                      cb702f4c81fb5b87a33e9fcaf058d4151795aef849d61dfff864017974ea05a9

                      SHA512

                      4a7a61154d31f673e3112d66ea16724f8f8ca4e8c2f44208e5e8107323bd16e3b8d86e6087b691c5c2f57b69f6c0ad5f2195b94540a96db49b82ba95d7a8816c

                    • C:\Users\Admin\AppData\Roaming\Xeer\ycezo.yba

                      Filesize

                      398B

                      MD5

                      6b0418217e9aa1b5792c79244de2df84

                      SHA1

                      b6ff61633d7dd1cfbbca222766819a2c8962f2f6

                      SHA256

                      d821ba6794fc8bf67ed3d6b02cccc16468efda461db646710eea01ea22f66c3e

                      SHA512

                      524f04e14275a1ce6cc1d76c5fef2fbd706ccee0dc0c0a7c1b15efdc4d3b5e3ebe5d6b72e1f9292803aa6b5de0db5b144e5b698cca80d6332fdcbf14b6bf80a0

                    • \Users\Admin\AppData\Roaming\Uvawky\zole.exe

                      Filesize

                      145KB

                      MD5

                      c30f1f377a51d5dda1d65d6df767cbb8

                      SHA1

                      93194831447d40bbfb6a1b45f40479e5cf74336d

                      SHA256

                      cb702f4c81fb5b87a33e9fcaf058d4151795aef849d61dfff864017974ea05a9

                      SHA512

                      4a7a61154d31f673e3112d66ea16724f8f8ca4e8c2f44208e5e8107323bd16e3b8d86e6087b691c5c2f57b69f6c0ad5f2195b94540a96db49b82ba95d7a8816c

                    • \Users\Admin\AppData\Roaming\Uvawky\zole.exe

                      Filesize

                      145KB

                      MD5

                      c30f1f377a51d5dda1d65d6df767cbb8

                      SHA1

                      93194831447d40bbfb6a1b45f40479e5cf74336d

                      SHA256

                      cb702f4c81fb5b87a33e9fcaf058d4151795aef849d61dfff864017974ea05a9

                      SHA512

                      4a7a61154d31f673e3112d66ea16724f8f8ca4e8c2f44208e5e8107323bd16e3b8d86e6087b691c5c2f57b69f6c0ad5f2195b94540a96db49b82ba95d7a8816c

                    • memory/556-126-0x0000000000050000-0x0000000000078000-memory.dmp

                      Filesize

                      160KB

                    • memory/556-128-0x0000000000050000-0x0000000000078000-memory.dmp

                      Filesize

                      160KB

                    • memory/556-132-0x0000000000050000-0x0000000000078000-memory.dmp

                      Filesize

                      160KB

                    • memory/556-123-0x0000000000050000-0x0000000000078000-memory.dmp

                      Filesize

                      160KB

                    • memory/556-127-0x0000000000050000-0x0000000000078000-memory.dmp

                      Filesize

                      160KB

                    • memory/664-137-0x0000000000310000-0x0000000000338000-memory.dmp

                      Filesize

                      160KB

                    • memory/664-139-0x0000000000310000-0x0000000000338000-memory.dmp

                      Filesize

                      160KB

                    • memory/664-140-0x0000000000310000-0x0000000000338000-memory.dmp

                      Filesize

                      160KB

                    • memory/664-138-0x0000000000310000-0x0000000000338000-memory.dmp

                      Filesize

                      160KB

                    • memory/1112-78-0x0000000001BC0000-0x0000000001BE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1112-77-0x0000000001BC0000-0x0000000001BE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1112-75-0x0000000001BC0000-0x0000000001BE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1112-79-0x0000000001BC0000-0x0000000001BE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1112-80-0x0000000001BC0000-0x0000000001BE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1180-83-0x0000000001AC0000-0x0000000001AE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1180-85-0x0000000001AC0000-0x0000000001AE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1180-86-0x0000000001AC0000-0x0000000001AE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1180-84-0x0000000001AC0000-0x0000000001AE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1208-89-0x0000000002610000-0x0000000002638000-memory.dmp

                      Filesize

                      160KB

                    • memory/1208-90-0x0000000002610000-0x0000000002638000-memory.dmp

                      Filesize

                      160KB

                    • memory/1208-93-0x0000000002610000-0x0000000002638000-memory.dmp

                      Filesize

                      160KB

                    • memory/1208-92-0x0000000002610000-0x0000000002638000-memory.dmp

                      Filesize

                      160KB

                    • memory/1548-134-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1548-71-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1548-72-0x0000000000250000-0x00000000002A0000-memory.dmp

                      Filesize

                      320KB

                    • memory/1548-68-0x0000000000250000-0x00000000002A0000-memory.dmp

                      Filesize

                      320KB

                    • memory/1632-100-0x00000000020E0000-0x0000000002108000-memory.dmp

                      Filesize

                      160KB

                    • memory/1632-58-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1632-59-0x0000000001BE0000-0x0000000001C30000-memory.dmp

                      Filesize

                      320KB

                    • memory/1632-96-0x00000000020E0000-0x0000000002108000-memory.dmp

                      Filesize

                      160KB

                    • memory/1632-62-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1632-130-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1632-55-0x0000000001BE0000-0x0000000001C30000-memory.dmp

                      Filesize

                      320KB

                    • memory/1632-99-0x00000000020E0000-0x0000000002108000-memory.dmp

                      Filesize

                      160KB

                    • memory/1632-98-0x00000000020E0000-0x0000000002108000-memory.dmp

                      Filesize

                      160KB

                    • memory/1632-97-0x00000000020E0000-0x0000000002108000-memory.dmp

                      Filesize

                      160KB

                    • memory/1632-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

                      Filesize

                      8KB

                    • memory/1684-102-0x000007FEF6CC1000-0x000007FEF6CC3000-memory.dmp

                      Filesize

                      8KB

                    • memory/1684-117-0x0000000003FC0000-0x0000000003FE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1684-118-0x0000000003FC0000-0x0000000003FE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1684-120-0x0000000003FC0000-0x0000000003FE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1684-119-0x0000000003FC0000-0x0000000003FE8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1684-109-0x00000000020C0000-0x00000000020D0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1684-103-0x0000000002060000-0x0000000002070000-memory.dmp

                      Filesize

                      64KB

                    • memory/1684-101-0x000007FEFC611000-0x000007FEFC613000-memory.dmp

                      Filesize

                      8KB