Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 12:03
Behavioral task
behavioral1
Sample
e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe
Resource
win10v2004-20220901-en
General
-
Target
e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe
-
Size
8KB
-
MD5
5ab820b15c95003442d7eeb56793f9f6
-
SHA1
5b62826ce33bd43a62e4c933bdcf4bb0c9b25375
-
SHA256
e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab
-
SHA512
35e39a23e18caa2821ea8fd08df5898bf089ba62a9192de8f14c1d19c1fc108c2f737dec95b0e3762421baa225b6b549a32096e064cba1964757960313d10f0c
-
SSDEEP
192:zhkVK0bFrX6G8wi/8LgLZBNiNg+S9p15FgmdRH:zaVNbRX9K0Lgoy+SimP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2004-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1888-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2004-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1888-67-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\inf\exepath.inf e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1484 sc.exe 1328 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe 1888 conime.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2004 e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2004 e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe 1888 conime.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1888 2004 e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe 28 PID 2004 wrote to memory of 1888 2004 e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe 28 PID 2004 wrote to memory of 1888 2004 e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe 28 PID 2004 wrote to memory of 1888 2004 e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe 28 PID 1888 wrote to memory of 1484 1888 conime.exe 29 PID 1888 wrote to memory of 1484 1888 conime.exe 29 PID 1888 wrote to memory of 1484 1888 conime.exe 29 PID 1888 wrote to memory of 1484 1888 conime.exe 29 PID 1888 wrote to memory of 1328 1888 conime.exe 31 PID 1888 wrote to memory of 1328 1888 conime.exe 31 PID 1888 wrote to memory of 1328 1888 conime.exe 31 PID 1888 wrote to memory of 1328 1888 conime.exe 31 PID 1888 wrote to memory of 1700 1888 conime.exe 33 PID 1888 wrote to memory of 1700 1888 conime.exe 33 PID 1888 wrote to memory of 1700 1888 conime.exe 33 PID 1888 wrote to memory of 1700 1888 conime.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe"C:\Users\Admin\AppData\Local\Temp\e104093a86d712f418c526446a18e437c77e766952bfe57c919f55bd26f488ab.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Internet Explorer\dhkoka\conime.exe"C:\Program Files\Internet Explorer\dhkoka\conime.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:1484
-
-
C:\Windows\SysWOW64\sc.exesc start Schedule3⤵
- Launches sc.exe
PID:1328
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC ONSTART /RU SYSTEM /TN JOBSTART /TR "\"C:\Program Files\Internet Explorer\dhkoka\\conime.exe\""3⤵
- Creates scheduled task(s)
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44B
MD592bbaedab55882671a3ffbd5b180af29
SHA13ea1dd3d81b1a475cf093f1e7ec7b2f9d575ff32
SHA2565ce63faaeda1f8170ef7ade3421d050b8760406e35aa961bf7cf6082e43b4d08
SHA512f0d0f80b33d763fce7d8aab1d8b8244c0d362b1915325e6bcd6e3a4d8e3c6c674b68ce5974f708db0d1f8994eef588324106ed9808245340a94604b35af76a3d