Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe
Resource
win10v2004-20220901-en
General
-
Target
ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe
-
Size
351KB
-
MD5
0881b6b804dc273e3db47068fc2c50df
-
SHA1
4a720c0d101da6f5c9511a236b6ac55bbdb33655
-
SHA256
ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97
-
SHA512
09956f7deed4ef84725f786a6e06853b381261af9820a0039a90f1e0ddc310c8bffcaab5c7ffe65271b99e00e425818364420e71f1c938044201d1abddf38693
-
SSDEEP
6144:5j6xvRw4yWlSIB+qSHuMK+Uu8J8RCf6GVAn69y/TNj6h3Jo/Yf:xC5SsfMK+UhJ3f60XkTN5w
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 576 yliq.exe -
Deletes itself 1 IoCs
pid Process 456 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run yliq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Zaniip\\yliq.exe" yliq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1928 set thread context of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe 576 yliq.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 576 yliq.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1928 wrote to memory of 576 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 26 PID 1928 wrote to memory of 576 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 26 PID 1928 wrote to memory of 576 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 26 PID 1928 wrote to memory of 576 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 26 PID 1928 wrote to memory of 576 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 26 PID 1928 wrote to memory of 576 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 26 PID 1928 wrote to memory of 576 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 26 PID 576 wrote to memory of 1236 576 yliq.exe 11 PID 576 wrote to memory of 1236 576 yliq.exe 11 PID 576 wrote to memory of 1236 576 yliq.exe 11 PID 576 wrote to memory of 1236 576 yliq.exe 11 PID 576 wrote to memory of 1236 576 yliq.exe 11 PID 576 wrote to memory of 1348 576 yliq.exe 10 PID 576 wrote to memory of 1348 576 yliq.exe 10 PID 576 wrote to memory of 1348 576 yliq.exe 10 PID 576 wrote to memory of 1348 576 yliq.exe 10 PID 576 wrote to memory of 1348 576 yliq.exe 10 PID 576 wrote to memory of 1400 576 yliq.exe 9 PID 576 wrote to memory of 1400 576 yliq.exe 9 PID 576 wrote to memory of 1400 576 yliq.exe 9 PID 576 wrote to memory of 1400 576 yliq.exe 9 PID 576 wrote to memory of 1400 576 yliq.exe 9 PID 576 wrote to memory of 1928 576 yliq.exe 14 PID 576 wrote to memory of 1928 576 yliq.exe 14 PID 576 wrote to memory of 1928 576 yliq.exe 14 PID 576 wrote to memory of 1928 576 yliq.exe 14 PID 576 wrote to memory of 1928 576 yliq.exe 14 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27 PID 1928 wrote to memory of 456 1928 ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe"C:\Users\Admin\AppData\Local\Temp\ef6491c53d7c8ef9fe2128d839084899379047a5a9d0d464a525c6c0ed70be97.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\Zaniip\yliq.exe"C:\Users\Admin\AppData\Roaming\Zaniip\yliq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp866dec8c.bat"3⤵
- Deletes itself
PID:456
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD55f5282c8d94c8212a2af71f72d1dbac1
SHA1c128c99f0bf853a8788d5c9ff71d0a3ba8aabb79
SHA25651ad3c4880ec514aed7372d67600ed78860c84a59f04225d805b9ab3a2e6d689
SHA51254c0e0fd54ce75cc15a949fb028914ca7e4f2e4581b7da07b131fa9dd5c47df27bc4695b057833d1075c5ebfdd88ae83e1e16def35d75babce1695fb819f97af
-
Filesize
351KB
MD5e849f26c09e67299723d3377558ff7c8
SHA111ef73e5c4f37b4328d913055c06f5896276b076
SHA2566fb90fd4be5baf4e8a789c83ba2a0e4d464f3180958b14ea9592c1e691ddf647
SHA512272513864f043acbe1299cc0009be3d5dfda535cd244b4d0277b9128c45b891ca2415e2fe5e074aabb8327b9bff810d4b8e91adaaf06a43b4b569d0f610e79e7
-
Filesize
351KB
MD5e849f26c09e67299723d3377558ff7c8
SHA111ef73e5c4f37b4328d913055c06f5896276b076
SHA2566fb90fd4be5baf4e8a789c83ba2a0e4d464f3180958b14ea9592c1e691ddf647
SHA512272513864f043acbe1299cc0009be3d5dfda535cd244b4d0277b9128c45b891ca2415e2fe5e074aabb8327b9bff810d4b8e91adaaf06a43b4b569d0f610e79e7
-
Filesize
351KB
MD5e849f26c09e67299723d3377558ff7c8
SHA111ef73e5c4f37b4328d913055c06f5896276b076
SHA2566fb90fd4be5baf4e8a789c83ba2a0e4d464f3180958b14ea9592c1e691ddf647
SHA512272513864f043acbe1299cc0009be3d5dfda535cd244b4d0277b9128c45b891ca2415e2fe5e074aabb8327b9bff810d4b8e91adaaf06a43b4b569d0f610e79e7