Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 18:06

General

  • Target

    787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe

  • Size

    124KB

  • MD5

    834b5880209a561a83cf9a8f6166ccd9

  • SHA1

    db459a0ed98a6a803efb954e5ea525966541a4f2

  • SHA256

    787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82

  • SHA512

    d10ffcc5eec993123bcfe63c683160e362c79739560a5e883702d51d4ceee5b6e1b96147a0e035ef0ffe47473439c30c252c02f466bf31e57d535035893d0cc7

  • SSDEEP

    1536:pNos4ZBjxaPhXv5wmTKTJMPpmn25vPp6xCoJ3fb7C:Dotcv5wqIn25v5ifbO

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe
    "C:\Users\Admin\AppData\Local\Temp\787f92840cefb9cc6cdfd050e1585d6faccf46ffbc618c347b059339b2516f82.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\ekfhmw.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\ekfhmw.exe
        C:\Windows\system32\ekfhmw.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        PID:1480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ekfhmw.exe

    Filesize

    46KB

    MD5

    d95e464236547d09729acf432377a32f

    SHA1

    0ea5b827656c1927fe9cdba258b8eb9959ebb4b4

    SHA256

    4befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee

    SHA512

    2b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123

  • C:\Windows\SysWOW64\ekfhmw.exe

    Filesize

    46KB

    MD5

    d95e464236547d09729acf432377a32f

    SHA1

    0ea5b827656c1927fe9cdba258b8eb9959ebb4b4

    SHA256

    4befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee

    SHA512

    2b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123

  • \Users\Admin\AppData\Local\Temp\2D58.tmp

    Filesize

    1.7MB

    MD5

    b5eb5bd3066959611e1f7a80fd6cc172

    SHA1

    6fb1532059212c840737b3f923a9c0b152c0887a

    SHA256

    1ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc

    SHA512

    6c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6

  • \Windows\SysWOW64\ekfhmw.exe

    Filesize

    46KB

    MD5

    d95e464236547d09729acf432377a32f

    SHA1

    0ea5b827656c1927fe9cdba258b8eb9959ebb4b4

    SHA256

    4befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee

    SHA512

    2b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123

  • \Windows\SysWOW64\ekfhmw.exe

    Filesize

    46KB

    MD5

    d95e464236547d09729acf432377a32f

    SHA1

    0ea5b827656c1927fe9cdba258b8eb9959ebb4b4

    SHA256

    4befb756c7f98bc5ea05f99b9f6640d903693d0acca78ea755f21913f16aefee

    SHA512

    2b4757009b794a3bb95617c13242b86ab65dd3f77bfffe6c3a592cb815fff1468b9c82cda04f4bd71d3d2f373d3c506ca53766aea00c6970e3fe97b2e0d8c123

  • memory/1480-61-0x0000000074C11000-0x0000000074C13000-memory.dmp

    Filesize

    8KB