Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 06:10
Behavioral task
behavioral1
Sample
98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe
Resource
win10v2004-20220812-en
General
-
Target
98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe
-
Size
205KB
-
MD5
1722ed342398e20d9b4c02290ed28ace
-
SHA1
b821e79711d1b3cc1d3b1584eacfed472d3d6853
-
SHA256
98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7
-
SHA512
8562ddd99405ba9edbef894470329690cc79de2d04e777611645bd3c0e96f840f8c2ba5722c58ef453a0f6e1f0df353f4b786039ba3b18612f74cf411c765489
-
SSDEEP
6144:WTmgzw8RTPbC55dXcnuUWzULEQIBS+eZ2G:ng0OPE9/zWtcSlM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 744 Itigya.exe -
resource yara_rule behavioral1/files/0x00080000000133a7-61.dat upx behavioral1/memory/744-63-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run Itigya.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\CL2GFOKBC9 = "C:\\Windows\\Itigya.exe" Itigya.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe File created C:\Windows\Itigya.exe 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe File opened for modification C:\Windows\Itigya.exe 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main Itigya.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 744 Itigya.exe 744 Itigya.exe 744 Itigya.exe 744 Itigya.exe 744 Itigya.exe 744 Itigya.exe 744 Itigya.exe 744 Itigya.exe 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 744 Itigya.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1408 wrote to memory of 744 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 26 PID 1408 wrote to memory of 744 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 26 PID 1408 wrote to memory of 744 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 26 PID 1408 wrote to memory of 744 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 26 PID 1408 wrote to memory of 744 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 26 PID 1408 wrote to memory of 744 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 26 PID 1408 wrote to memory of 744 1408 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe"C:\Users\Admin\AppData\Local\Temp\98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Itigya.exeC:\Windows\Itigya.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD51722ed342398e20d9b4c02290ed28ace
SHA1b821e79711d1b3cc1d3b1584eacfed472d3d6853
SHA25698eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7
SHA5128562ddd99405ba9edbef894470329690cc79de2d04e777611645bd3c0e96f840f8c2ba5722c58ef453a0f6e1f0df353f4b786039ba3b18612f74cf411c765489
-
Filesize
408B
MD5512ee848cee4ebff3dd177983e12817d
SHA1d92e4a0fb5bc7cf0b5815230485622ee35bc00ef
SHA256c3b263c97bcb2392ed51abad558852b4fadac1e42939ecfe321b0deba4e11f94
SHA51235107d8e98b0cc15b20f8f2129298b4179a65777990f89749b63a80aa352b66c4e9f393ca7bd00c70610300dea7e37794a63e7d0e71aae6219b1d7616555d74d