Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe
Resource
win10v2004-20220812-en
General
-
Target
8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe
-
Size
311KB
-
MD5
a3962bf2a21f34818449e04019363650
-
SHA1
f39694542a2074d66b271fcc12fd6195aba513a7
-
SHA256
8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6
-
SHA512
53128eb391e59cadaa0105ec8cc665d5dea54874085a9f342803fd3927f7db1313b91b9c8013e8512d91e02d8db177d588f722c662edff5be69fc28f79701e95
-
SSDEEP
6144:e9YMRrQyO3CvUD0nV+10e+cDCRpuASljKWT8d8ctrIN3CW:OZa3w5eXORkjKWwamU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1220 peyr.exe -
Deletes itself 1 IoCs
pid Process 648 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run peyr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B4F18C8-4FEF-AD4D-3A07-B8B71A0C9BAA} = "C:\\Users\\Admin\\AppData\\Roaming\\Ibciew\\peyr.exe" peyr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 864 set thread context of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe 1220 peyr.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 864 wrote to memory of 1220 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 27 PID 864 wrote to memory of 1220 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 27 PID 864 wrote to memory of 1220 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 27 PID 864 wrote to memory of 1220 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 27 PID 1220 wrote to memory of 1140 1220 peyr.exe 14 PID 1220 wrote to memory of 1140 1220 peyr.exe 14 PID 1220 wrote to memory of 1140 1220 peyr.exe 14 PID 1220 wrote to memory of 1140 1220 peyr.exe 14 PID 1220 wrote to memory of 1140 1220 peyr.exe 14 PID 1220 wrote to memory of 1240 1220 peyr.exe 13 PID 1220 wrote to memory of 1240 1220 peyr.exe 13 PID 1220 wrote to memory of 1240 1220 peyr.exe 13 PID 1220 wrote to memory of 1240 1220 peyr.exe 13 PID 1220 wrote to memory of 1240 1220 peyr.exe 13 PID 1220 wrote to memory of 1296 1220 peyr.exe 12 PID 1220 wrote to memory of 1296 1220 peyr.exe 12 PID 1220 wrote to memory of 1296 1220 peyr.exe 12 PID 1220 wrote to memory of 1296 1220 peyr.exe 12 PID 1220 wrote to memory of 1296 1220 peyr.exe 12 PID 1220 wrote to memory of 864 1220 peyr.exe 26 PID 1220 wrote to memory of 864 1220 peyr.exe 26 PID 1220 wrote to memory of 864 1220 peyr.exe 26 PID 1220 wrote to memory of 864 1220 peyr.exe 26 PID 1220 wrote to memory of 864 1220 peyr.exe 26 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28 PID 864 wrote to memory of 648 864 8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe"C:\Users\Admin\AppData\Local\Temp\8103e34bccf94c1171907b88cb5a257d015e6a6a15ffe6b341c4fe8301ee60f6.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Roaming\Ibciew\peyr.exe"C:\Users\Admin\AppData\Roaming\Ibciew\peyr.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc29eb04c.bat"3⤵
- Deletes itself
PID:648
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1240
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD52e34601f7aa5218aa5414a78d1f5fdfd
SHA186da641b85a177998e57d30b4f6744dc8b1068dd
SHA2560f819f2dea058f52db23f32afe73cb9eeae89b0ed4bf42b6a3b16eb147fb8804
SHA512ccdf33576dfbfc4f6681cfa384243acd258d23de080b56dbcce286c2cd1881687e680919ef4ea1292fec7b3102ccbdbd1650687d5605779baf7b8b1181acb302
-
Filesize
311KB
MD5a32d46a348b25aa6a2de7d6cf0ee1b23
SHA1606eccb8fa4a1c9f4283510ef624cfb822699def
SHA256f22971846a26652051408fea49af84f4e63d6758eb7efa57a8183df7c7f4ea75
SHA5124246a5b4e2eb4027574a5bc2f40b32c47252ddd85b96f390d700e947fe93716813d4de2af2fa48dc3eff40d83e336a68ec70a63b13ea56c345eaf408ca0b6175
-
Filesize
311KB
MD5a32d46a348b25aa6a2de7d6cf0ee1b23
SHA1606eccb8fa4a1c9f4283510ef624cfb822699def
SHA256f22971846a26652051408fea49af84f4e63d6758eb7efa57a8183df7c7f4ea75
SHA5124246a5b4e2eb4027574a5bc2f40b32c47252ddd85b96f390d700e947fe93716813d4de2af2fa48dc3eff40d83e336a68ec70a63b13ea56c345eaf408ca0b6175
-
Filesize
311KB
MD5a32d46a348b25aa6a2de7d6cf0ee1b23
SHA1606eccb8fa4a1c9f4283510ef624cfb822699def
SHA256f22971846a26652051408fea49af84f4e63d6758eb7efa57a8183df7c7f4ea75
SHA5124246a5b4e2eb4027574a5bc2f40b32c47252ddd85b96f390d700e947fe93716813d4de2af2fa48dc3eff40d83e336a68ec70a63b13ea56c345eaf408ca0b6175
-
Filesize
311KB
MD5a32d46a348b25aa6a2de7d6cf0ee1b23
SHA1606eccb8fa4a1c9f4283510ef624cfb822699def
SHA256f22971846a26652051408fea49af84f4e63d6758eb7efa57a8183df7c7f4ea75
SHA5124246a5b4e2eb4027574a5bc2f40b32c47252ddd85b96f390d700e947fe93716813d4de2af2fa48dc3eff40d83e336a68ec70a63b13ea56c345eaf408ca0b6175