Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe
Resource
win10v2004-20220812-en
General
-
Target
39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe
-
Size
363KB
-
MD5
84dc75ecd03c863e078c1d2bb44e3d4c
-
SHA1
3a8ede7f1d6b0570f4e1674b5311f042f22fa7aa
-
SHA256
39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69
-
SHA512
a17d422bc54cd390fccad5d1ec0d1c946a50728a7626cbd06ac849b2dd63b987a0983b52de8591af850552066fe2f7c0ffbef4708ad7303a23eedfd8bfb515f6
-
SSDEEP
6144:sbIAyTXCQuBVJxRbq3gkKJFoXrSePZ3hH0WO1ohKXm:HTSJ77eoJFe+ehaXm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1600 soguel.exe -
Deletes itself 1 IoCs
pid Process 756 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run soguel.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B4F18C8-4FEF-AD4D-3A07-B8B71A0C9BAA} = "C:\\Users\\Admin\\AppData\\Roaming\\Yxow\\soguel.exe" soguel.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe 1600 soguel.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 1600 soguel.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1600 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 28 PID 1836 wrote to memory of 1600 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 28 PID 1836 wrote to memory of 1600 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 28 PID 1836 wrote to memory of 1600 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 28 PID 1600 wrote to memory of 1128 1600 soguel.exe 12 PID 1600 wrote to memory of 1128 1600 soguel.exe 12 PID 1600 wrote to memory of 1128 1600 soguel.exe 12 PID 1600 wrote to memory of 1128 1600 soguel.exe 12 PID 1600 wrote to memory of 1128 1600 soguel.exe 12 PID 1600 wrote to memory of 1192 1600 soguel.exe 11 PID 1600 wrote to memory of 1192 1600 soguel.exe 11 PID 1600 wrote to memory of 1192 1600 soguel.exe 11 PID 1600 wrote to memory of 1192 1600 soguel.exe 11 PID 1600 wrote to memory of 1192 1600 soguel.exe 11 PID 1600 wrote to memory of 1260 1600 soguel.exe 10 PID 1600 wrote to memory of 1260 1600 soguel.exe 10 PID 1600 wrote to memory of 1260 1600 soguel.exe 10 PID 1600 wrote to memory of 1260 1600 soguel.exe 10 PID 1600 wrote to memory of 1260 1600 soguel.exe 10 PID 1600 wrote to memory of 1836 1600 soguel.exe 16 PID 1600 wrote to memory of 1836 1600 soguel.exe 16 PID 1600 wrote to memory of 1836 1600 soguel.exe 16 PID 1600 wrote to memory of 1836 1600 soguel.exe 16 PID 1600 wrote to memory of 1836 1600 soguel.exe 16 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29 PID 1836 wrote to memory of 756 1836 39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe"C:\Users\Admin\AppData\Local\Temp\39505b80304aa7842b32576f5b371d052e18983fba7b0fca60356c67598c6c69.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Roaming\Yxow\soguel.exe"C:\Users\Admin\AppData\Roaming\Yxow\soguel.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc5730a1b.bat"3⤵
- Deletes itself
PID:756
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD534381de19dbbf32450c6bfd5040dae60
SHA17b9a48da05378eb2c43a4ed9999ec4708aca800c
SHA256b4b00462e8a19a23d08c532421c4540968926a1d1270e75de5ca09689748600c
SHA51210b636708a40e960c292bbbc02e1ae12985517597acc36bd436b9cf2764cf41bf3d542ec03bb7054f7b83c40231884a02c978335e4a595cb4e06382b146c065b
-
Filesize
363KB
MD53f559d2a0009da36fbcfc07fd9ca20ba
SHA1e2fe78057e05d3e06b61af5fa010127bd5aeed0d
SHA2560cfc7bdeaae43feaa51b4ec19cd2b2e0826ab818aee5d98a15a68a2d01479df7
SHA51251a611f148b7e9d1ea5bf31da6e869b1c2ca1ca131473e1e0ebe673aded3edcd0a7535630c952fe15445785cda1931542d9cfcf88df90779b455016f83462cda
-
Filesize
363KB
MD53f559d2a0009da36fbcfc07fd9ca20ba
SHA1e2fe78057e05d3e06b61af5fa010127bd5aeed0d
SHA2560cfc7bdeaae43feaa51b4ec19cd2b2e0826ab818aee5d98a15a68a2d01479df7
SHA51251a611f148b7e9d1ea5bf31da6e869b1c2ca1ca131473e1e0ebe673aded3edcd0a7535630c952fe15445785cda1931542d9cfcf88df90779b455016f83462cda
-
Filesize
363KB
MD53f559d2a0009da36fbcfc07fd9ca20ba
SHA1e2fe78057e05d3e06b61af5fa010127bd5aeed0d
SHA2560cfc7bdeaae43feaa51b4ec19cd2b2e0826ab818aee5d98a15a68a2d01479df7
SHA51251a611f148b7e9d1ea5bf31da6e869b1c2ca1ca131473e1e0ebe673aded3edcd0a7535630c952fe15445785cda1931542d9cfcf88df90779b455016f83462cda
-
Filesize
363KB
MD53f559d2a0009da36fbcfc07fd9ca20ba
SHA1e2fe78057e05d3e06b61af5fa010127bd5aeed0d
SHA2560cfc7bdeaae43feaa51b4ec19cd2b2e0826ab818aee5d98a15a68a2d01479df7
SHA51251a611f148b7e9d1ea5bf31da6e869b1c2ca1ca131473e1e0ebe673aded3edcd0a7535630c952fe15445785cda1931542d9cfcf88df90779b455016f83462cda