Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 12:25

General

  • Target

    d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe

  • Size

    292KB

  • MD5

    59b92d6f40d4f519c74d85ce161273f0

  • SHA1

    4d4303b777ec5227edebd1f6718ba5d57d7853a5

  • SHA256

    d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f

  • SHA512

    94d5cb7b21b31e25ca0466958c27d213dd212eede98c29d4f9902cfcd92dc8cad0760d739cc7d394fae988bce0061d93fd9a6c30adca624b207beae90acbd220

  • SSDEEP

    6144:7A3ZCuyLR08hbKevouzpTGuiB7L67R0Ldeb9/oYcSNo9WGYDcVx8Ge:7CrO00bFvouNTgBOR0B23cSNKooVK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe
        "C:\Users\Admin\AppData\Local\Temp\d38163807b352160af6d161bfb80236df914e2ea19a6e7a5843850b9d666944f.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Users\Admin\AppData\Roaming\Icugyc\veluh.exe
          "C:\Users\Admin\AppData\Roaming\Icugyc\veluh.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1716
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\RVPFAB0.bat"
          3⤵
          • Deletes itself
          PID:1344
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1336
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1236

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RVPFAB0.bat

          Filesize

          303B

          MD5

          4c8ac02817a11d5375b85118e058e417

          SHA1

          173ba9857f86644bc1423b32ca6ac96aae0d8b73

          SHA256

          2f9996abde330bf9cb51fb3b3a4b199e76d64c3119f77db802592a8f4fe57674

          SHA512

          2747ffbd697f6d42f453c9996f2c4f34bd57e298880b03284a23b62bee9e6f853fa53e2c497be54ba6f6bd700b1aa3d3cc21d2e0f6ee6ddc0d0914d32bef3700

        • C:\Users\Admin\AppData\Roaming\Icugyc\veluh.exe

          Filesize

          292KB

          MD5

          f1d63d4a8a058bfc32bf0b3aca59c495

          SHA1

          14e611188adda8fa9ffac5cf5b56eb3b77bd7d14

          SHA256

          3c628ef2c1d7bf1c0b60eca20fcdb3167a26646c8a5dc8a6583ba826d77f0045

          SHA512

          e105904855917345a862914535e16c375c7f2b2d4fdcb87797c53de04914f09bfbed38869c42aaaef770fd8985255138c811daff45c0751f2366c7f85d433317

        • C:\Users\Admin\AppData\Roaming\Icugyc\veluh.exe

          Filesize

          292KB

          MD5

          f1d63d4a8a058bfc32bf0b3aca59c495

          SHA1

          14e611188adda8fa9ffac5cf5b56eb3b77bd7d14

          SHA256

          3c628ef2c1d7bf1c0b60eca20fcdb3167a26646c8a5dc8a6583ba826d77f0045

          SHA512

          e105904855917345a862914535e16c375c7f2b2d4fdcb87797c53de04914f09bfbed38869c42aaaef770fd8985255138c811daff45c0751f2366c7f85d433317

        • \Users\Admin\AppData\Roaming\Icugyc\veluh.exe

          Filesize

          292KB

          MD5

          f1d63d4a8a058bfc32bf0b3aca59c495

          SHA1

          14e611188adda8fa9ffac5cf5b56eb3b77bd7d14

          SHA256

          3c628ef2c1d7bf1c0b60eca20fcdb3167a26646c8a5dc8a6583ba826d77f0045

          SHA512

          e105904855917345a862914535e16c375c7f2b2d4fdcb87797c53de04914f09bfbed38869c42aaaef770fd8985255138c811daff45c0751f2366c7f85d433317

        • \Users\Admin\AppData\Roaming\Icugyc\veluh.exe

          Filesize

          292KB

          MD5

          f1d63d4a8a058bfc32bf0b3aca59c495

          SHA1

          14e611188adda8fa9ffac5cf5b56eb3b77bd7d14

          SHA256

          3c628ef2c1d7bf1c0b60eca20fcdb3167a26646c8a5dc8a6583ba826d77f0045

          SHA512

          e105904855917345a862914535e16c375c7f2b2d4fdcb87797c53de04914f09bfbed38869c42aaaef770fd8985255138c811daff45c0751f2366c7f85d433317

        • memory/1236-65-0x0000000000410000-0x0000000000458000-memory.dmp

          Filesize

          288KB

        • memory/1236-67-0x0000000000410000-0x0000000000458000-memory.dmp

          Filesize

          288KB

        • memory/1236-68-0x0000000000410000-0x0000000000458000-memory.dmp

          Filesize

          288KB

        • memory/1236-69-0x0000000000410000-0x0000000000458000-memory.dmp

          Filesize

          288KB

        • memory/1236-70-0x0000000000410000-0x0000000000458000-memory.dmp

          Filesize

          288KB

        • memory/1336-75-0x0000000001BF0000-0x0000000001C38000-memory.dmp

          Filesize

          288KB

        • memory/1336-73-0x0000000001BF0000-0x0000000001C38000-memory.dmp

          Filesize

          288KB

        • memory/1336-76-0x0000000001BF0000-0x0000000001C38000-memory.dmp

          Filesize

          288KB

        • memory/1336-74-0x0000000001BF0000-0x0000000001C38000-memory.dmp

          Filesize

          288KB

        • memory/1344-100-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1344-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1344-97-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1344-113-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1344-101-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1344-99-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1344-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1344-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1344-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1344-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1344-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1344-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1388-80-0x0000000002A80000-0x0000000002AC8000-memory.dmp

          Filesize

          288KB

        • memory/1388-82-0x0000000002A80000-0x0000000002AC8000-memory.dmp

          Filesize

          288KB

        • memory/1388-81-0x0000000002A80000-0x0000000002AC8000-memory.dmp

          Filesize

          288KB

        • memory/1388-79-0x0000000002A80000-0x0000000002AC8000-memory.dmp

          Filesize

          288KB

        • memory/1716-63-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1768-86-0x00000000004A0000-0x00000000004E8000-memory.dmp

          Filesize

          288KB

        • memory/1768-54-0x0000000076961000-0x0000000076963000-memory.dmp

          Filesize

          8KB

        • memory/1768-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1768-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1768-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1768-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1768-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1768-103-0x00000000004A0000-0x00000000004E8000-memory.dmp

          Filesize

          288KB

        • memory/1768-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1768-88-0x00000000004A0000-0x00000000004E8000-memory.dmp

          Filesize

          288KB

        • memory/1768-87-0x00000000004A0000-0x00000000004E8000-memory.dmp

          Filesize

          288KB

        • memory/1768-85-0x00000000004A0000-0x00000000004E8000-memory.dmp

          Filesize

          288KB

        • memory/1768-56-0x0000000000401000-0x0000000000441000-memory.dmp

          Filesize

          256KB

        • memory/1768-55-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB