Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 01:21
Behavioral task
behavioral1
Sample
bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe
Resource
win10v2004-20220901-en
General
-
Target
bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe
-
Size
204KB
-
MD5
130bbeefd312fbb50c17def135aea227
-
SHA1
dada773e1f43be73c90f1d6cbc793e6f772de060
-
SHA256
bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c
-
SHA512
bea564f0121c9bf31e4923ff1583f7f253495aceeff907c9565cacc55ea137b545e89f93f4b8931fafd8560a2d5a6880b32b8cd5b9825aa3c995fe96c8bf32b9
-
SSDEEP
6144:DpXBPMxVtaJr2bgORfxCGvWJNPdPHkWlnmhtXMThDysdJn+lhR:DpXszF79xCGv05dPEimhm1Dys4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1948 tepyk.exe -
resource yara_rule behavioral1/memory/364-54-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/files/0x000a0000000135a6-58.dat upx behavioral1/files/0x000a0000000135a6-59.dat upx behavioral1/files/0x000a0000000135a6-61.dat upx behavioral1/files/0x000a0000000135a6-63.dat upx -
Deletes itself 1 IoCs
pid Process 1460 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run tepyk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9F8719CC-6B08-4BBB-FDA1-220A708A9CCC} = "C:\\Users\\Admin\\AppData\\Roaming\\Sariyk\\tepyk.exe" tepyk.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe 1948 tepyk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 364 wrote to memory of 1948 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 26 PID 364 wrote to memory of 1948 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 26 PID 364 wrote to memory of 1948 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 26 PID 364 wrote to memory of 1948 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 26 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 1948 wrote to memory of 1944 1948 tepyk.exe 27 PID 364 wrote to memory of 1460 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 28 PID 364 wrote to memory of 1460 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 28 PID 364 wrote to memory of 1460 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 28 PID 364 wrote to memory of 1460 364 bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe 28 PID 1948 wrote to memory of 1240 1948 tepyk.exe 11 PID 1948 wrote to memory of 1240 1948 tepyk.exe 11 PID 1948 wrote to memory of 1240 1948 tepyk.exe 11 PID 1948 wrote to memory of 1240 1948 tepyk.exe 11 PID 1948 wrote to memory of 1240 1948 tepyk.exe 11 PID 1948 wrote to memory of 1320 1948 tepyk.exe 12 PID 1948 wrote to memory of 1320 1948 tepyk.exe 12 PID 1948 wrote to memory of 1320 1948 tepyk.exe 12 PID 1948 wrote to memory of 1320 1948 tepyk.exe 12 PID 1948 wrote to memory of 1320 1948 tepyk.exe 12 PID 1948 wrote to memory of 1356 1948 tepyk.exe 13 PID 1948 wrote to memory of 1356 1948 tepyk.exe 13 PID 1948 wrote to memory of 1356 1948 tepyk.exe 13 PID 1948 wrote to memory of 1356 1948 tepyk.exe 13 PID 1948 wrote to memory of 1356 1948 tepyk.exe 13 PID 1948 wrote to memory of 1856 1948 tepyk.exe 30 PID 1948 wrote to memory of 1856 1948 tepyk.exe 30 PID 1948 wrote to memory of 1856 1948 tepyk.exe 30 PID 1948 wrote to memory of 1856 1948 tepyk.exe 30 PID 1948 wrote to memory of 1856 1948 tepyk.exe 30 PID 1948 wrote to memory of 1640 1948 tepyk.exe 31 PID 1948 wrote to memory of 1640 1948 tepyk.exe 31 PID 1948 wrote to memory of 1640 1948 tepyk.exe 31 PID 1948 wrote to memory of 1640 1948 tepyk.exe 31 PID 1948 wrote to memory of 1640 1948 tepyk.exe 31 PID 1948 wrote to memory of 820 1948 tepyk.exe 32 PID 1948 wrote to memory of 820 1948 tepyk.exe 32 PID 1948 wrote to memory of 820 1948 tepyk.exe 32 PID 1948 wrote to memory of 820 1948 tepyk.exe 32 PID 1948 wrote to memory of 820 1948 tepyk.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1240
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe"C:\Users\Admin\AppData\Local\Temp\bda9b6a3d05347c45fb6c5e76c0cb3a986d77bdd8e90e148aba7b430e33c674c.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Roaming\Sariyk\tepyk.exe"C:\Users\Admin\AppData\Roaming\Sariyk\tepyk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa91e0186.bat"3⤵
- Deletes itself
PID:1460
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1856
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1640
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5b9c017bea97c4efaacfff7f82ec17973
SHA1fe4bc12cf60aa37c688d88807c263c622afd8baf
SHA25697b681e9df1499be10c8683b16a217169da1b99b7951f0531159052cd982ca7d
SHA5121f789c8d9c8f71a88c21605a44335827bb853a9b44dc7a31c5a79e8739e5011217d0c9c306c652e6d2e3fd949a081703f7986c3e579a6e0a9a0c542edcc33631
-
Filesize
204KB
MD5f35252afe2a30db1c526d3cbb57422cd
SHA169ee0073e313601efaf482ee66fc55aa401b9260
SHA25644d4cad26fefee244329e9b972bbcc0be0d4477c7851da93fed4c4e347b2d7d0
SHA51212fcd85bd3d4cc8b1b3c9e767429dfe55234d42a993881554bf4bb62cb6054da29fd8701d9abf2d9ae868781660a507855b41015f157838c34e3aff7a1641412
-
Filesize
204KB
MD5f35252afe2a30db1c526d3cbb57422cd
SHA169ee0073e313601efaf482ee66fc55aa401b9260
SHA25644d4cad26fefee244329e9b972bbcc0be0d4477c7851da93fed4c4e347b2d7d0
SHA51212fcd85bd3d4cc8b1b3c9e767429dfe55234d42a993881554bf4bb62cb6054da29fd8701d9abf2d9ae868781660a507855b41015f157838c34e3aff7a1641412
-
Filesize
204KB
MD5f35252afe2a30db1c526d3cbb57422cd
SHA169ee0073e313601efaf482ee66fc55aa401b9260
SHA25644d4cad26fefee244329e9b972bbcc0be0d4477c7851da93fed4c4e347b2d7d0
SHA51212fcd85bd3d4cc8b1b3c9e767429dfe55234d42a993881554bf4bb62cb6054da29fd8701d9abf2d9ae868781660a507855b41015f157838c34e3aff7a1641412
-
Filesize
204KB
MD5f35252afe2a30db1c526d3cbb57422cd
SHA169ee0073e313601efaf482ee66fc55aa401b9260
SHA25644d4cad26fefee244329e9b972bbcc0be0d4477c7851da93fed4c4e347b2d7d0
SHA51212fcd85bd3d4cc8b1b3c9e767429dfe55234d42a993881554bf4bb62cb6054da29fd8701d9abf2d9ae868781660a507855b41015f157838c34e3aff7a1641412