Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 08:02

General

  • Target

    d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe

  • Size

    312KB

  • MD5

    809ac69a3e964b97e8bc26f3007213b0

  • SHA1

    e26be135256df75c4141b5e6a088884309405340

  • SHA256

    d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4

  • SHA512

    b117fd0d0b81b73fe9cad5531686d465871c7cc55e3b67d36a76cdb9a4ff862d6aec563f42adf52d9c22cee91c0c76752bfa0fff17af9efc86e7082ac0bd5c9d

  • SSDEEP

    6144:YhaxRhcIOpQ5l3Yg+qxWLTZPu3ZVDUX0Fpq0hCaYxv2i3n/jeYQ9WnziGg:YMhcItnYgbaZwVG0fq0jYt/jeDQjg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1128
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1188
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1224
          • C:\Users\Admin\AppData\Local\Temp\d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe
            "C:\Users\Admin\AppData\Local\Temp\d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Users\Admin\AppData\Roaming\Boevh\wobet.exe
              "C:\Users\Admin\AppData\Roaming\Boevh\wobet.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:804
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7e811536.bat"
              3⤵
              • Deletes itself
              PID:1360

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp7e811536.bat

          Filesize

          307B

          MD5

          c29c646708fd8d090f2158a015044ab6

          SHA1

          8824b3ca786252ee9d5e877af43bac75a124a641

          SHA256

          63f6ae2c719e101773bd2a607d4312b0edfc455d2a0e12e0926d4af7969f9ed4

          SHA512

          6f08f45dd6448d431d389831dc9423f176ec841878171f76005223eb285d0a2c1c323c8354d1a570b7435ae15f52411e4d56aa3b2f5db4496dacdafd09d86f84

        • C:\Users\Admin\AppData\Roaming\Boevh\wobet.exe

          Filesize

          312KB

          MD5

          59fd431ffe5fffee758e0af9a82ab10d

          SHA1

          f6c30748f47f225aa160f1ebfd8f81f16f14d865

          SHA256

          0aa080576e1b5edd46cecef0ef46353830651064e3ff9c5c2d2eaa8b58629ecf

          SHA512

          ed954d202aa64982872605553a7814290c64dcfc006b0295e83f099345715e91c6d3b26f66f412a7da0e81a9a337fbefcda5f21340841ee75089dd2983c81400

        • C:\Users\Admin\AppData\Roaming\Boevh\wobet.exe

          Filesize

          312KB

          MD5

          59fd431ffe5fffee758e0af9a82ab10d

          SHA1

          f6c30748f47f225aa160f1ebfd8f81f16f14d865

          SHA256

          0aa080576e1b5edd46cecef0ef46353830651064e3ff9c5c2d2eaa8b58629ecf

          SHA512

          ed954d202aa64982872605553a7814290c64dcfc006b0295e83f099345715e91c6d3b26f66f412a7da0e81a9a337fbefcda5f21340841ee75089dd2983c81400

        • \Users\Admin\AppData\Roaming\Boevh\wobet.exe

          Filesize

          312KB

          MD5

          59fd431ffe5fffee758e0af9a82ab10d

          SHA1

          f6c30748f47f225aa160f1ebfd8f81f16f14d865

          SHA256

          0aa080576e1b5edd46cecef0ef46353830651064e3ff9c5c2d2eaa8b58629ecf

          SHA512

          ed954d202aa64982872605553a7814290c64dcfc006b0295e83f099345715e91c6d3b26f66f412a7da0e81a9a337fbefcda5f21340841ee75089dd2983c81400

        • \Users\Admin\AppData\Roaming\Boevh\wobet.exe

          Filesize

          312KB

          MD5

          59fd431ffe5fffee758e0af9a82ab10d

          SHA1

          f6c30748f47f225aa160f1ebfd8f81f16f14d865

          SHA256

          0aa080576e1b5edd46cecef0ef46353830651064e3ff9c5c2d2eaa8b58629ecf

          SHA512

          ed954d202aa64982872605553a7814290c64dcfc006b0295e83f099345715e91c6d3b26f66f412a7da0e81a9a337fbefcda5f21340841ee75089dd2983c81400

        • memory/804-63-0x0000000000400000-0x0000000000454000-memory.dmp

          Filesize

          336KB

        • memory/1128-67-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1128-65-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1128-68-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1128-69-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1128-70-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1188-73-0x0000000001D40000-0x0000000001D88000-memory.dmp

          Filesize

          288KB

        • memory/1188-74-0x0000000001D40000-0x0000000001D88000-memory.dmp

          Filesize

          288KB

        • memory/1188-75-0x0000000001D40000-0x0000000001D88000-memory.dmp

          Filesize

          288KB

        • memory/1188-76-0x0000000001D40000-0x0000000001D88000-memory.dmp

          Filesize

          288KB

        • memory/1224-82-0x0000000002AC0000-0x0000000002B08000-memory.dmp

          Filesize

          288KB

        • memory/1224-81-0x0000000002AC0000-0x0000000002B08000-memory.dmp

          Filesize

          288KB

        • memory/1224-79-0x0000000002AC0000-0x0000000002B08000-memory.dmp

          Filesize

          288KB

        • memory/1224-80-0x0000000002AC0000-0x0000000002B08000-memory.dmp

          Filesize

          288KB

        • memory/1360-99-0x00000000000B0000-0x00000000000F8000-memory.dmp

          Filesize

          288KB

        • memory/1360-100-0x00000000000B0000-0x00000000000F8000-memory.dmp

          Filesize

          288KB

        • memory/1360-113-0x00000000000B0000-0x00000000000F8000-memory.dmp

          Filesize

          288KB

        • memory/1360-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1360-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1360-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1360-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1360-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1360-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1360-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1360-101-0x00000000000B0000-0x00000000000F8000-memory.dmp

          Filesize

          288KB

        • memory/1360-97-0x00000000000B0000-0x00000000000F8000-memory.dmp

          Filesize

          288KB

        • memory/1712-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1712-56-0x0000000000401000-0x0000000000441000-memory.dmp

          Filesize

          256KB

        • memory/1712-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1712-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1712-103-0x0000000000460000-0x00000000004A8000-memory.dmp

          Filesize

          288KB

        • memory/1712-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1712-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1712-54-0x00000000765B1000-0x00000000765B3000-memory.dmp

          Filesize

          8KB

        • memory/1712-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1712-85-0x0000000000460000-0x00000000004A8000-memory.dmp

          Filesize

          288KB

        • memory/1712-88-0x0000000000460000-0x00000000004A8000-memory.dmp

          Filesize

          288KB

        • memory/1712-87-0x0000000000460000-0x00000000004A8000-memory.dmp

          Filesize

          288KB

        • memory/1712-55-0x0000000000400000-0x0000000000454000-memory.dmp

          Filesize

          336KB

        • memory/1712-86-0x0000000000460000-0x00000000004A8000-memory.dmp

          Filesize

          288KB