Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe
Resource
win10v2004-20220812-en
General
-
Target
d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe
-
Size
292KB
-
MD5
59b92d6f40d4f519c74d85ce161273f0
-
SHA1
4d4303b777ec5227edebd1f6718ba5d57d7853a5
-
SHA256
d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f
-
SHA512
94d5cb7b21b31e25ca0466958c27d213dd212eede98c29d4f9902cfcd92dc8cad0760d739cc7d394fae988bce0061d93fd9a6c30adca624b207beae90acbd220
-
SSDEEP
6144:7A3ZCuyLR08hbKevouzpTGuiB7L67R0Ldeb9/oYcSNo9WGYDcVx8Ge:7CrO00bFvouNTgBOR0B23cSNKooVK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 veluh.exe -
Deletes itself 1 IoCs
pid Process 1344 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run veluh.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Veluh = "C:\\Users\\Admin\\AppData\\Roaming\\Icugyc\\veluh.exe" veluh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1768 set thread context of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe 1716 veluh.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1716 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 27 PID 1768 wrote to memory of 1716 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 27 PID 1768 wrote to memory of 1716 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 27 PID 1768 wrote to memory of 1716 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 27 PID 1716 wrote to memory of 1236 1716 veluh.exe 17 PID 1716 wrote to memory of 1236 1716 veluh.exe 17 PID 1716 wrote to memory of 1236 1716 veluh.exe 17 PID 1716 wrote to memory of 1236 1716 veluh.exe 17 PID 1716 wrote to memory of 1236 1716 veluh.exe 17 PID 1716 wrote to memory of 1336 1716 veluh.exe 16 PID 1716 wrote to memory of 1336 1716 veluh.exe 16 PID 1716 wrote to memory of 1336 1716 veluh.exe 16 PID 1716 wrote to memory of 1336 1716 veluh.exe 16 PID 1716 wrote to memory of 1336 1716 veluh.exe 16 PID 1716 wrote to memory of 1388 1716 veluh.exe 15 PID 1716 wrote to memory of 1388 1716 veluh.exe 15 PID 1716 wrote to memory of 1388 1716 veluh.exe 15 PID 1716 wrote to memory of 1388 1716 veluh.exe 15 PID 1716 wrote to memory of 1388 1716 veluh.exe 15 PID 1716 wrote to memory of 1768 1716 veluh.exe 26 PID 1716 wrote to memory of 1768 1716 veluh.exe 26 PID 1716 wrote to memory of 1768 1716 veluh.exe 26 PID 1716 wrote to memory of 1768 1716 veluh.exe 26 PID 1716 wrote to memory of 1768 1716 veluh.exe 26 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28 PID 1768 wrote to memory of 1344 1768 d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe"C:\Users\Admin\AppData\Local\Temp\d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Roaming\Icugyc\veluh.exe"C:\Users\Admin\AppData\Roaming\Icugyc\veluh.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\RVPFAB0.bat"3⤵
- Deletes itself
PID:1344
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1336
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD54c8ac02817a11d5375b85118e058e417
SHA1173ba9857f86644bc1423b32ca6ac96aae0d8b73
SHA2562f9996abde330bf9cb51fb3b3a4b199e76d64c3119f77db802592a8f4fe57674
SHA5122747ffbd697f6d42f453c9996f2c4f34bd57e298880b03284a23b62bee9e6f853fa53e2c497be54ba6f6bd700b1aa3d3cc21d2e0f6ee6ddc0d0914d32bef3700
-
Filesize
292KB
MD5f1d63d4a8a058bfc32bf0b3aca59c495
SHA114e611188adda8fa9ffac5cf5b56eb3b77bd7d14
SHA2563c628ef2c1d7bf1c0b60eca20fcdb3167a26646c8a5dc8a6583ba826d77f0045
SHA512e105904855917345a862914535e16c375c7f2b2d4fdcb87797c53de04914f09bfbed38869c42aaaef770fd8985255138c811daff45c0751f2366c7f85d433317
-
Filesize
292KB
MD5f1d63d4a8a058bfc32bf0b3aca59c495
SHA114e611188adda8fa9ffac5cf5b56eb3b77bd7d14
SHA2563c628ef2c1d7bf1c0b60eca20fcdb3167a26646c8a5dc8a6583ba826d77f0045
SHA512e105904855917345a862914535e16c375c7f2b2d4fdcb87797c53de04914f09bfbed38869c42aaaef770fd8985255138c811daff45c0751f2366c7f85d433317
-
Filesize
292KB
MD5f1d63d4a8a058bfc32bf0b3aca59c495
SHA114e611188adda8fa9ffac5cf5b56eb3b77bd7d14
SHA2563c628ef2c1d7bf1c0b60eca20fcdb3167a26646c8a5dc8a6583ba826d77f0045
SHA512e105904855917345a862914535e16c375c7f2b2d4fdcb87797c53de04914f09bfbed38869c42aaaef770fd8985255138c811daff45c0751f2366c7f85d433317
-
Filesize
292KB
MD5f1d63d4a8a058bfc32bf0b3aca59c495
SHA114e611188adda8fa9ffac5cf5b56eb3b77bd7d14
SHA2563c628ef2c1d7bf1c0b60eca20fcdb3167a26646c8a5dc8a6583ba826d77f0045
SHA512e105904855917345a862914535e16c375c7f2b2d4fdcb87797c53de04914f09bfbed38869c42aaaef770fd8985255138c811daff45c0751f2366c7f85d433317