Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe
Resource
win10v2004-20220901-en
General
-
Target
787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe
-
Size
124KB
-
MD5
834b5880209a561a83cf9a8f6166ccd9
-
SHA1
db459a0ed98a6a803efb954e5ea525966541a4f2
-
SHA256
787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82
-
SHA512
d10ffcc5eec993123bcfe63c683160e362c79739560a5e883702d51d4ceee5b6e1b96147a0e035ef0ffe47473439c30c252c02f466bf31e57d535035893d0cc7
-
SSDEEP
1536:pNos4ZBjxaPhXv5wmTKTJMPpmn25vPp6xCoJ3fb7C:Dotcv5wqIn25v5ifbO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1480 ekfhmw.exe -
Loads dropped DLL 3 IoCs
pid Process 1472 cmd.exe 1472 cmd.exe 1480 ekfhmw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" ekfhmw.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ekfhmw.exe 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 112 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 112 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 112 wrote to memory of 1472 112 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe 27 PID 112 wrote to memory of 1472 112 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe 27 PID 112 wrote to memory of 1472 112 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe 27 PID 112 wrote to memory of 1472 112 787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe 27 PID 1472 wrote to memory of 1480 1472 cmd.exe 29 PID 1472 wrote to memory of 1480 1472 cmd.exe 29 PID 1472 wrote to memory of 1480 1472 cmd.exe 29 PID 1472 wrote to memory of 1480 1472 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe"C:\Users\Admin\AppData\Local\Temp\787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\ekfhmw.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\ekfhmw.exeC:\Windows\system32\ekfhmw.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1480
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5d95e464236547d09729acf432377a32f
SHA10ea5b827656c1927fe9cdba258b8eb9959ebb4b4
SHA2564befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee
SHA5122b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123
-
Filesize
46KB
MD5d95e464236547d09729acf432377a32f
SHA10ea5b827656c1927fe9cdba258b8eb9959ebb4b4
SHA2564befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee
SHA5122b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6
-
Filesize
46KB
MD5d95e464236547d09729acf432377a32f
SHA10ea5b827656c1927fe9cdba258b8eb9959ebb4b4
SHA2564befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee
SHA5122b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123
-
Filesize
46KB
MD5d95e464236547d09729acf432377a32f
SHA10ea5b827656c1927fe9cdba258b8eb9959ebb4b4
SHA2564befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee
SHA5122b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123