Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe
Resource
win10v2004-20220812-en
General
-
Target
d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe
-
Size
312KB
-
MD5
809ac69a3e964b97e8bc26f3007213b0
-
SHA1
e26be135256df75c4141b5e6a088884309405340
-
SHA256
d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4
-
SHA512
b117fd0d0b81b73fe9cad5531686d465871c7cc55e3b67d36a76cdb9a4ff862d6aec563f42adf52d9c22cee91c0c76752bfa0fff17af9efc86e7082ac0bd5c9d
-
SSDEEP
6144:YhaxRhcIOpQ5l3Yg+qxWLTZPu3ZVDUX0Fpq0hCaYxv2i3n/jeYQ9WnziGg:YMhcItnYgbaZwVG0fq0jYt/jeDQjg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 804 wobet.exe -
Deletes itself 1 IoCs
pid Process 1360 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run wobet.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wobet = "C:\\Users\\Admin\\AppData\\Roaming\\Boevh\\wobet.exe" wobet.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe 804 wobet.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1712 wrote to memory of 804 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 27 PID 1712 wrote to memory of 804 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 27 PID 1712 wrote to memory of 804 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 27 PID 1712 wrote to memory of 804 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 27 PID 804 wrote to memory of 1128 804 wobet.exe 18 PID 804 wrote to memory of 1128 804 wobet.exe 18 PID 804 wrote to memory of 1128 804 wobet.exe 18 PID 804 wrote to memory of 1128 804 wobet.exe 18 PID 804 wrote to memory of 1128 804 wobet.exe 18 PID 804 wrote to memory of 1188 804 wobet.exe 19 PID 804 wrote to memory of 1188 804 wobet.exe 19 PID 804 wrote to memory of 1188 804 wobet.exe 19 PID 804 wrote to memory of 1188 804 wobet.exe 19 PID 804 wrote to memory of 1188 804 wobet.exe 19 PID 804 wrote to memory of 1224 804 wobet.exe 20 PID 804 wrote to memory of 1224 804 wobet.exe 20 PID 804 wrote to memory of 1224 804 wobet.exe 20 PID 804 wrote to memory of 1224 804 wobet.exe 20 PID 804 wrote to memory of 1224 804 wobet.exe 20 PID 804 wrote to memory of 1712 804 wobet.exe 26 PID 804 wrote to memory of 1712 804 wobet.exe 26 PID 804 wrote to memory of 1712 804 wobet.exe 26 PID 804 wrote to memory of 1712 804 wobet.exe 26 PID 804 wrote to memory of 1712 804 wobet.exe 26 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28 PID 1712 wrote to memory of 1360 1712 d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe"C:\Users\Admin\AppData\Local\Temp\d5fa4b1723e9f66e627da2ad46e74e4c4eeba0783cbc917d6ef79ebe91462ac4.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\Boevh\wobet.exe"C:\Users\Admin\AppData\Roaming\Boevh\wobet.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7e811536.bat"3⤵
- Deletes itself
PID:1360
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5c29c646708fd8d090f2158a015044ab6
SHA18824b3ca786252ee9d5e877af43bac75a124a641
SHA25663f6ae2c719e101773bd2a607d4312b0edfc455d2a0e12e0926d4af7969f9ed4
SHA5126f08f45dd6448d431d389831dc9423f176ec841878171f76005223eb285d0a2c1c323c8354d1a570b7435ae15f52411e4d56aa3b2f5db4496dacdafd09d86f84
-
Filesize
312KB
MD559fd431ffe5fffee758e0af9a82ab10d
SHA1f6c30748f47f225aa160f1ebfd8f81f16f14d865
SHA2560aa080576e1b5edd46cecef0ef46353830651064e3ff9c5c2d2eaa8b58629ecf
SHA512ed954d202aa64982872605553a7814290c64dcfc006b0295e83f099345715e91c6d3b26f66f412a7da0e81a9a337fbefcda5f21340841ee75089dd2983c81400
-
Filesize
312KB
MD559fd431ffe5fffee758e0af9a82ab10d
SHA1f6c30748f47f225aa160f1ebfd8f81f16f14d865
SHA2560aa080576e1b5edd46cecef0ef46353830651064e3ff9c5c2d2eaa8b58629ecf
SHA512ed954d202aa64982872605553a7814290c64dcfc006b0295e83f099345715e91c6d3b26f66f412a7da0e81a9a337fbefcda5f21340841ee75089dd2983c81400
-
Filesize
312KB
MD559fd431ffe5fffee758e0af9a82ab10d
SHA1f6c30748f47f225aa160f1ebfd8f81f16f14d865
SHA2560aa080576e1b5edd46cecef0ef46353830651064e3ff9c5c2d2eaa8b58629ecf
SHA512ed954d202aa64982872605553a7814290c64dcfc006b0295e83f099345715e91c6d3b26f66f412a7da0e81a9a337fbefcda5f21340841ee75089dd2983c81400
-
Filesize
312KB
MD559fd431ffe5fffee758e0af9a82ab10d
SHA1f6c30748f47f225aa160f1ebfd8f81f16f14d865
SHA2560aa080576e1b5edd46cecef0ef46353830651064e3ff9c5c2d2eaa8b58629ecf
SHA512ed954d202aa64982872605553a7814290c64dcfc006b0295e83f099345715e91c6d3b26f66f412a7da0e81a9a337fbefcda5f21340841ee75089dd2983c81400