Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe
Resource
win10v2004-20220812-en
General
-
Target
4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe
-
Size
284KB
-
MD5
12134afc08cc6eec52ab045a27ccc557
-
SHA1
84e3f1278c9c79d4312a4d10178e0d12da3dda98
-
SHA256
4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71
-
SHA512
7cea96310c64b634900e8f74d8575dee45f4fa3f69b0f0528876c1a6a62b8e071e0632d7455f6c3d088efbcbdc69bd041665d2bd2ee8bf947389e4dd0f83209b
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\1072 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mseqcakua.cmd" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1164 skyrpe.exe 1652 skyrpe.exe 1324 skyrpe.exe -
resource yara_rule behavioral1/memory/1232-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1232-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1232-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1232-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1232-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1232-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1232-81-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1232-101-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1652-102-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1652-108-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1376 set thread context of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1164 set thread context of 1652 1164 skyrpe.exe 31 PID 1164 set thread context of 1324 1164 skyrpe.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\mseqcakua.cmd svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1324 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1324 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe Token: SeDebugPrivilege 1652 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 1164 skyrpe.exe 1652 skyrpe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1376 wrote to memory of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1376 wrote to memory of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1376 wrote to memory of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1376 wrote to memory of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1376 wrote to memory of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1376 wrote to memory of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1376 wrote to memory of 1232 1376 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 26 PID 1232 wrote to memory of 1220 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 27 PID 1232 wrote to memory of 1220 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 27 PID 1232 wrote to memory of 1220 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 27 PID 1232 wrote to memory of 1220 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 27 PID 1220 wrote to memory of 1728 1220 cmd.exe 29 PID 1220 wrote to memory of 1728 1220 cmd.exe 29 PID 1220 wrote to memory of 1728 1220 cmd.exe 29 PID 1220 wrote to memory of 1728 1220 cmd.exe 29 PID 1232 wrote to memory of 1164 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 30 PID 1232 wrote to memory of 1164 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 30 PID 1232 wrote to memory of 1164 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 30 PID 1232 wrote to memory of 1164 1232 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 30 PID 1164 wrote to memory of 1652 1164 skyrpe.exe 31 PID 1164 wrote to memory of 1652 1164 skyrpe.exe 31 PID 1164 wrote to memory of 1652 1164 skyrpe.exe 31 PID 1164 wrote to memory of 1652 1164 skyrpe.exe 31 PID 1164 wrote to memory of 1652 1164 skyrpe.exe 31 PID 1164 wrote to memory of 1652 1164 skyrpe.exe 31 PID 1164 wrote to memory of 1652 1164 skyrpe.exe 31 PID 1164 wrote to memory of 1652 1164 skyrpe.exe 31 PID 1164 wrote to memory of 1324 1164 skyrpe.exe 32 PID 1164 wrote to memory of 1324 1164 skyrpe.exe 32 PID 1164 wrote to memory of 1324 1164 skyrpe.exe 32 PID 1164 wrote to memory of 1324 1164 skyrpe.exe 32 PID 1164 wrote to memory of 1324 1164 skyrpe.exe 32 PID 1164 wrote to memory of 1324 1164 skyrpe.exe 32 PID 1164 wrote to memory of 1324 1164 skyrpe.exe 32 PID 1324 wrote to memory of 976 1324 skyrpe.exe 33 PID 1324 wrote to memory of 976 1324 skyrpe.exe 33 PID 1324 wrote to memory of 976 1324 skyrpe.exe 33 PID 1324 wrote to memory of 976 1324 skyrpe.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe"C:\Users\Admin\AppData\Local\Temp\4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe"C:\Users\Admin\AppData\Local\Temp\4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KYFOX.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:1728
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:976
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938
-
Filesize
284KB
MD503e6d735f2a6103729bc573cc92ba019
SHA1efc1c0b11c36a50c5b304a89b0c8e2fd2177bb1f
SHA25624e847b55c9653aa47089509c4d97901fa81c4f50f85f370e5ca940d757250a0
SHA5120e0b6fa747e65abb09409abb99e195930519cae703fb13701c59d2cf2da8b0bfd6caa7b15d7507ced7f22012efe96924b66bc05653abb29dde2074e5f2c35938