Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe
Resource
win10v2004-20220901-en
General
-
Target
a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe
-
Size
300KB
-
MD5
a20120062a1ddb5abf58c674ad023660
-
SHA1
33c042aaf21b64229a3ee8fa00390f96c67a9714
-
SHA256
a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b
-
SHA512
539a89f245ceb6ec9cfc520fd0d982cc3f25c61f3862013e112d3d98bfa5cc7ad1334672ca2ce329c3a08d1b8662ab2a6a4a8f58c75285602408f7c63a2e55cb
-
SSDEEP
6144:UlSWnu93+NLuC6vKljOuf+DrIhoG5L/hztBOMygTikuu:AGq6vKQDEi6J9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 awtavo.exe -
Deletes itself 1 IoCs
pid Process 1104 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run awtavo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Kuycbi\\awtavo.exe" awtavo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1348 set thread context of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe 2032 awtavo.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2032 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 27 PID 1348 wrote to memory of 2032 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 27 PID 1348 wrote to memory of 2032 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 27 PID 1348 wrote to memory of 2032 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 27 PID 2032 wrote to memory of 1068 2032 awtavo.exe 18 PID 2032 wrote to memory of 1068 2032 awtavo.exe 18 PID 2032 wrote to memory of 1068 2032 awtavo.exe 18 PID 2032 wrote to memory of 1068 2032 awtavo.exe 18 PID 2032 wrote to memory of 1068 2032 awtavo.exe 18 PID 2032 wrote to memory of 1164 2032 awtavo.exe 16 PID 2032 wrote to memory of 1164 2032 awtavo.exe 16 PID 2032 wrote to memory of 1164 2032 awtavo.exe 16 PID 2032 wrote to memory of 1164 2032 awtavo.exe 16 PID 2032 wrote to memory of 1164 2032 awtavo.exe 16 PID 2032 wrote to memory of 1208 2032 awtavo.exe 15 PID 2032 wrote to memory of 1208 2032 awtavo.exe 15 PID 2032 wrote to memory of 1208 2032 awtavo.exe 15 PID 2032 wrote to memory of 1208 2032 awtavo.exe 15 PID 2032 wrote to memory of 1208 2032 awtavo.exe 15 PID 2032 wrote to memory of 1348 2032 awtavo.exe 26 PID 2032 wrote to memory of 1348 2032 awtavo.exe 26 PID 2032 wrote to memory of 1348 2032 awtavo.exe 26 PID 2032 wrote to memory of 1348 2032 awtavo.exe 26 PID 2032 wrote to memory of 1348 2032 awtavo.exe 26 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28 PID 1348 wrote to memory of 1104 1348 a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe"C:\Users\Admin\AppData\Local\Temp\a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\Kuycbi\awtavo.exe"C:\Users\Admin\AppData\Roaming\Kuycbi\awtavo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfba18cea.bat"3⤵
- Deletes itself
PID:1104
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5a438056e9b87e98d5be4a60b4f0459a1
SHA10a45e0936c62acbcf0ceecd0e0578b91c0da87b0
SHA25697089e5ac1b2b9cd8b62c3c5c8fb4c4e7eecfb482e20c135bde2fd41e21c307d
SHA51284ed95ea7b2c5fff6c93f44335da7ba65d8d4890529f75d5556de0e978f820570a392200c0941b0332e970c239504ed12231607fcd295def63f2a86943c7e588
-
Filesize
300KB
MD5dcf95b379361a2c34dd58ad10b188afd
SHA1bf91da89c4ecad4b0014816e903267a8cb6fcca6
SHA25645e7d1490fde91e0aef20bd528ced411134014433795aabeda0ea68f1993a4fe
SHA51234124d0a77fe4f502a8be411125cf1155c4caed59a801951720d767e5129e85d4bc142cb0f59971c3ef4706580661b950d2f3d80f0d0e1171d1dab15c2a83329
-
Filesize
300KB
MD5dcf95b379361a2c34dd58ad10b188afd
SHA1bf91da89c4ecad4b0014816e903267a8cb6fcca6
SHA25645e7d1490fde91e0aef20bd528ced411134014433795aabeda0ea68f1993a4fe
SHA51234124d0a77fe4f502a8be411125cf1155c4caed59a801951720d767e5129e85d4bc142cb0f59971c3ef4706580661b950d2f3d80f0d0e1171d1dab15c2a83329
-
Filesize
300KB
MD5dcf95b379361a2c34dd58ad10b188afd
SHA1bf91da89c4ecad4b0014816e903267a8cb6fcca6
SHA25645e7d1490fde91e0aef20bd528ced411134014433795aabeda0ea68f1993a4fe
SHA51234124d0a77fe4f502a8be411125cf1155c4caed59a801951720d767e5129e85d4bc142cb0f59971c3ef4706580661b950d2f3d80f0d0e1171d1dab15c2a83329
-
Filesize
300KB
MD5dcf95b379361a2c34dd58ad10b188afd
SHA1bf91da89c4ecad4b0014816e903267a8cb6fcca6
SHA25645e7d1490fde91e0aef20bd528ced411134014433795aabeda0ea68f1993a4fe
SHA51234124d0a77fe4f502a8be411125cf1155c4caed59a801951720d767e5129e85d4bc142cb0f59971c3ef4706580661b950d2f3d80f0d0e1171d1dab15c2a83329