Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 21:39
Behavioral task
behavioral1
Sample
21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe
Resource
win10v2004-20220812-en
General
-
Target
21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe
-
Size
80KB
-
MD5
0bf986be40980fd38c6d39e61167a9af
-
SHA1
40bf3a6018b57bce24ef1db12bd92df6f130de37
-
SHA256
21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b
-
SHA512
729b02302c4fc70900c9813673acb37c69f71e68792dea0dc8aedcbd235db92b2a43d17740f8659591da8c2c45931bcfbc3dc2732e00e0c80b4a6cd4aae83e4b
-
SSDEEP
1536:ZnKZViWUC/JV16uXKNhOiFuCx9pmiG0si+p+InQ5gk:Z0ViWhz161fog9pVG0snnXk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1232 explorer.exe 1368 explorer.exe -
resource yara_rule behavioral1/memory/560-55-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/files/0x000a00000001232e-59.dat upx behavioral1/files/0x000a00000001232e-61.dat upx behavioral1/files/0x000a00000001232e-57.dat upx behavioral1/files/0x000a00000001232e-56.dat upx behavioral1/memory/1232-64-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/files/0x00080000000126a6-65.dat upx behavioral1/files/0x000a00000001232e-67.dat upx behavioral1/files/0x000a00000001232e-69.dat upx behavioral1/files/0x000a00000001232e-66.dat upx behavioral1/memory/1368-71-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/files/0x00090000000126a6-72.dat upx behavioral1/files/0x000a00000001232e-76.dat upx behavioral1/files/0x000a00000001232e-74.dat upx behavioral1/files/0x000a00000001232e-73.dat upx behavioral1/memory/1640-79-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/560-80-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1232-81-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/files/0x000a0000000126a6-82.dat upx -
Loads dropped DLL 4 IoCs
pid Process 560 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe 560 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe 1232 explorer.exe 1232 explorer.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\m: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\q: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\h: explorer.exe File opened (read-only) \??\f: explorer.exe File opened (read-only) \??\l: explorer.exe File opened (read-only) \??\y: explorer.exe File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\o: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\s: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\t: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\r: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\h: explorer.exe File opened (read-only) \??\h: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\u: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\e: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\w: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\k: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\l: explorer.exe File opened (read-only) \??\j: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\g: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\t: explorer.exe File opened (read-only) \??\z: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\f: explorer.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\m: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\t: explorer.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\l: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\v: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\n: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\x: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\m: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\f: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\i: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\p: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\y: 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened (read-only) \??\n: explorer.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\jfdfcewiuu\explorer.exe 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened for modification C:\Windows\SysWOW64\jfdfcewiuu\explorer.exe 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File created C:\Windows\SysWOW64\ykndywlqab\smss.exe 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe File opened for modification C:\Windows\SysWOW64\jfdfcewiuu\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\ykndywlqab\smss.exe explorer.exe File created C:\Windows\SysWOW64\jfdfcewiuu\explorer.exe explorer.exe File created C:\Windows\SysWOW64\ykndywlqab\smss.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 560 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe 1232 explorer.exe 1368 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLoadDriverPrivilege 560 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe Token: SeLoadDriverPrivilege 1232 explorer.exe Token: SeLoadDriverPrivilege 1368 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 560 wrote to memory of 1232 560 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe 28 PID 560 wrote to memory of 1232 560 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe 28 PID 560 wrote to memory of 1232 560 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe 28 PID 560 wrote to memory of 1232 560 21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe 28 PID 1232 wrote to memory of 1368 1232 explorer.exe 29 PID 1232 wrote to memory of 1368 1232 explorer.exe 29 PID 1232 wrote to memory of 1368 1232 explorer.exe 29 PID 1232 wrote to memory of 1368 1232 explorer.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe"C:\Users\Admin\AppData\Local\Temp\21cbedb0b2d9a139adce337672851bda35cffc972bf20f490040483eda45337b.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\jfdfcewiuu\explorer.exeC:\Windows\system32\jfdfcewiuu\explorer.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\jfdfcewiuu\explorer.exeC:\Windows\system32\jfdfcewiuu\explorer.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\SysWOW64\jfdfcewiuu\explorer.exeC:\Windows\system32\jfdfcewiuu\explorer.exe4⤵PID:1640
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5c971b2322d80f04a2003e1a264171d48
SHA168f2094fede7ee7f6fb6be0628d3f4b63d73c73c
SHA256d92cc360a4fa012ce376e741b1259e6af08d15b9f0e3149c135520c9e12c91b7
SHA512e9a07f7cca0405a34661e4fea9aee50f209742c78b82f2a58f8b24a3ed8fe3f5bff911f4d0069acd7b5fafc4f7c5fe0bb72632ace766bd9a03520c41f116c011
-
Filesize
28KB
MD58884e3736fadee4f6d2a0dbdd49d59f7
SHA1274c89d00775832a73e6afea1bbbb6cb3a047f30
SHA256833d9c8e260a45429181c1af020d22df8ec1504b58a0842a1553abe9fc6df802
SHA512747ac089f81049c4c72cb7f3da9e7cc368670b3049414ec2c389a7a1709f59888428cff460093935987e77df50dec203e2b98db27d92cb558af24acd625ae884
-
Filesize
64KB
MD5d990f5da9375aa79ae75a6c09fa94c1f
SHA147d87e91a87313bb9b2866f4db095f03a8d304bc
SHA256b0b7c2b05b09b4befaf3293f941b94d5f91d81f72e994c74f6500851b5ada52a
SHA512db6f9535196f46d488a20319393c0ca26fd599dceda138984c417ebd0d97a8f9aa34dd7a31d44fd0069bbaa76e31d96d21e1ce01d6d674e1d40ca05fe6dfe95b
-
Filesize
32KB
MD5ca600eaae2bc85127f1449534140129f
SHA1480744694e09abaeea6e5dc70170bd87e7bb7d44
SHA2563b5696e492b5addd548b00d9b74bb9ea5ca6ea1791ddd3a472d34f8066df88a2
SHA5123771cd373f333b81a78856fa62b0acc010c8485be3b68fa792cad45ec88d0c15ca9d16e5cf0533b94a4cd944fe07a1435044c505dd70482fafe7a8f51521ffed
-
Filesize
60KB
MD535d915e8333dd87ac6d6bcce5fbecd59
SHA106c240bce90940a5fcbae67894e292fcb8b074d5
SHA256a84ee7d7713c5337d1f8868eb7943f2087f18061cc11fef1b631287cf5297745
SHA512bf42d642cf68f60595f7a19e85f41a271b058f7d5368b460395f11eccc6d2ecc3db864e17aa3f40fc15a681586577ada68a4ec361c06a883ca80a3f804c7ff35
-
Filesize
39KB
MD5d82862b3a0ecb7ffec857101ad6208c2
SHA1838fc96716f63dcc14ef96be6eb9cf69276928d9
SHA2567a2cfc7cb8537a732b53a08f5cf6469cb1a8e9cd3391dadbc9c3d016db94755a
SHA512493905c94a75e65bd91dd9170d4eb37861825d81f4e4cbe3ba499b36cec6b6f4f3cc0629c9cb2837350b8d7c132d2c3f1676d1226853511ccbd09309128c5bc1
-
Filesize
22KB
MD567133eb83d3c43b906e51f700a366d85
SHA1f9b6162d0c190ffb4af884be6318a7181f5105f1
SHA25665703c20544bb9e5da42f6769df9ab9e45043f9198f7496bdaf6a028dc8eaf30
SHA51239fdaa2bde150dcab1782dcd312733f60ddb5e167de59ca1ef5d0ed2640ab7313ee5476b4bf033e0679177ff2ef0a83d4ead3fd026756a0e222cc07d1954e9f3
-
Filesize
76KB
MD542797acac6cda009458ea263bd9c5056
SHA1d4d899c33281c75dfa407ed026fc1aaee8614702
SHA25673c93fc5c9ac74e639571065140024da693bd80501b74bfac877b3784bf2a049
SHA5128faa36a2b32150940fed92bb3cfbf395f7e77d694e4befd4b5419b039f806a34dbe61e8438446ffc68bf471446fcfe00c51fb4f56cb024491ff0d86579c3653d
-
Filesize
29KB
MD50c1596a5793437dcbc98e9f991896be1
SHA1dccaf77dcbca660b048d08c22b8a65570591e90a
SHA256a0e48d42557de297859c23712022a358c9b7ac18267342d0b323420ebe365f53
SHA5122a3ac304a72456336c9d41e5d48f77200ce74a15717fd469252483cfa1265b980ab445174ae9a31d576399705533909e11f7e26f5e5d1ee7fb9b05f644c58acf
-
Filesize
36KB
MD54ada81a1ae245a413c4c18dccb70c6f3
SHA14613e4e3902862e6c048b5e4a24a595af7e53f3f
SHA2569ae7c6978771c40caa35597c921293fb5fbd6164d30a12482e8b43eb2689736b
SHA5128676750d7040e76bbf07d41e5430a543fb0f054601faeb4cbe710ff83be17409b3fb524357d2daa46bdfe4a8fcfc54cff10cc9796dbda98a9fad1f595880dfbc
-
Filesize
24KB
MD51e13afe1e38975892350940bd083d999
SHA17b04dfe627517824dbc21bcdae18b53d25f60e92
SHA256dc670deb7ba1940102d8a1c61aaa9bfa1ab052d2ad0a776190ed4d6990fb9358
SHA512c9212f3453e02df66253e6123c0751ffc93116912b6a46549a3673876c939f30f17888d95e81071c234444a663c8a34964a82daf661a26a1b716c82d3f81b573
-
Filesize
37KB
MD555e3250e781d5a22312cf8fdd91b0388
SHA154256ffebdd8c8acf1bd290feed878a7695ddb1d
SHA2560f3732438f9f42b5c33e926efc75f909a7b0c5d29bea9316bdbe512091c3ac02
SHA512fd143f226bcd572fd5d93a2a42043c77e8ef5b83caf6a36f5cdd63aa78c063da316e66c8e1107a437d2230160076cbcb5fb17b9173aca152c3d316a540eed348
-
Filesize
26KB
MD5186ae79f8e382004095ea0130f1b4321
SHA10adc401981d1766d4bfc8b75fe6c3ca578c05c2f
SHA256644beb41b8388d0ab5858bab184609e0a3af61cb0ef1a6d017404f2259d74680
SHA512b832dae34f28ccdf1f9483a7c060d68f8626faaf9e3e70fdaf4a7ff646a74744adefd8ee754a4f64a335a8e8e9ea52b24e5fd4a529bb94cac14ac74ce5644e19