Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe
Resource
win10v2004-20221111-en
General
-
Target
5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe
-
Size
323KB
-
MD5
b16f784cfeb39e3aae32706cc12f3cad
-
SHA1
909bcc04aad342462e489db69ddb7078ea56a249
-
SHA256
5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c
-
SHA512
89ec937d34dfce008387e0669332c0b92bdf10e1a1e16f2b85b3c2c32b0d57751df66000bb4daaa21dbe8d4f061470c8b388cd31314d955d247d051392b35445
-
SSDEEP
6144:bzWSRKXnr0ISPlkai1sU0NrI/Gd6FXw0Z:tRinr0ISPlkasZ0NuGdP0Z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1912 itcya.exe 1852 itcya.exe -
Deletes itself 1 IoCs
pid Process 432 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run itcya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E12199DC-67C7-A35E-938F-561E8482DAAE} = "C:\\Users\\Admin\\AppData\\Roaming\\Awza\\itcya.exe" itcya.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1776 set thread context of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1912 set thread context of 1852 1912 itcya.exe 30 PID 1348 set thread context of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\4F222191-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 1912 itcya.exe 1912 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe 1852 itcya.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe Token: SeSecurityPrivilege 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe Token: SeSecurityPrivilege 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe Token: SeSecurityPrivilege 432 cmd.exe Token: SeSecurityPrivilege 432 cmd.exe Token: SeManageVolumePrivilege 520 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 520 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 520 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 520 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1776 wrote to memory of 1348 1776 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 28 PID 1348 wrote to memory of 1912 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 29 PID 1348 wrote to memory of 1912 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 29 PID 1348 wrote to memory of 1912 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 29 PID 1348 wrote to memory of 1912 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 29 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1912 wrote to memory of 1852 1912 itcya.exe 30 PID 1852 wrote to memory of 1120 1852 itcya.exe 25 PID 1852 wrote to memory of 1120 1852 itcya.exe 25 PID 1852 wrote to memory of 1120 1852 itcya.exe 25 PID 1852 wrote to memory of 1120 1852 itcya.exe 25 PID 1852 wrote to memory of 1120 1852 itcya.exe 25 PID 1852 wrote to memory of 1184 1852 itcya.exe 24 PID 1852 wrote to memory of 1184 1852 itcya.exe 24 PID 1852 wrote to memory of 1184 1852 itcya.exe 24 PID 1852 wrote to memory of 1184 1852 itcya.exe 24 PID 1852 wrote to memory of 1184 1852 itcya.exe 24 PID 1852 wrote to memory of 1264 1852 itcya.exe 17 PID 1852 wrote to memory of 1264 1852 itcya.exe 17 PID 1852 wrote to memory of 1264 1852 itcya.exe 17 PID 1852 wrote to memory of 1264 1852 itcya.exe 17 PID 1852 wrote to memory of 1264 1852 itcya.exe 17 PID 1852 wrote to memory of 1348 1852 itcya.exe 28 PID 1852 wrote to memory of 1348 1852 itcya.exe 28 PID 1852 wrote to memory of 1348 1852 itcya.exe 28 PID 1852 wrote to memory of 1348 1852 itcya.exe 28 PID 1852 wrote to memory of 1348 1852 itcya.exe 28 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1348 wrote to memory of 432 1348 5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe 31 PID 1852 wrote to memory of 748 1852 itcya.exe 32 PID 1852 wrote to memory of 748 1852 itcya.exe 32 PID 1852 wrote to memory of 748 1852 itcya.exe 32 PID 1852 wrote to memory of 748 1852 itcya.exe 32 PID 1852 wrote to memory of 748 1852 itcya.exe 32 PID 1852 wrote to memory of 520 1852 itcya.exe 33 PID 1852 wrote to memory of 520 1852 itcya.exe 33 PID 1852 wrote to memory of 520 1852 itcya.exe 33 PID 1852 wrote to memory of 520 1852 itcya.exe 33 PID 1852 wrote to memory of 520 1852 itcya.exe 33 PID 1852 wrote to memory of 1588 1852 itcya.exe 34 PID 1852 wrote to memory of 1588 1852 itcya.exe 34 PID 1852 wrote to memory of 1588 1852 itcya.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe"C:\Users\Admin\AppData\Local\Temp\5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe"C:\Users\Admin\AppData\Local\Temp\5ccc7dac021af7551dcd3715eeb5e1a2095d823d6044a63f5b83e59ea1e2087c.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\Awza\itcya.exe"C:\Users\Admin\AppData\Roaming\Awza\itcya.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Roaming\Awza\itcya.exe"C:\Users\Admin\AppData\Roaming\Awza\itcya.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8c5d7ca8.bat"4⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "14338651272023976112-1548688107-931096873-1976336601-855862865-820064624-1532327870"1⤵PID:748
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:520
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1856
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5a3cb4d0ce7ae8270012cf057aff296bd
SHA17b4072c29ecfb0e6be3e7ede85d9265f0654f6eb
SHA256bd9e4d22dadab97cc3c99af69d0303e0cd9b60d4da76d32d79d9003ed1871508
SHA51291ed8d3e57bc5d8032cda86c31574bbed74b2bb2b54ea93fe78b51b560a4cf5c8d8bfb23cde15c25c703b7c673ca1656f43605224510b4de5657ecbf864cd700
-
Filesize
323KB
MD537176a2608facbf21a6bf59948cd849c
SHA16a9b02f1ad2d715fca286ab23ec79e3ba21a4370
SHA25630670c0677708a43a55ff310e42280cd717d110fa218c46d19e723200278f339
SHA5125423066b7f9b4e55fdff21a23b72c78e60d05a16d0a7e3a05436c8f40d2434de103b04afc5a888e950865f0b3b76ff215f676d64a1c1678dd8fb282e20dc07bd
-
Filesize
323KB
MD537176a2608facbf21a6bf59948cd849c
SHA16a9b02f1ad2d715fca286ab23ec79e3ba21a4370
SHA25630670c0677708a43a55ff310e42280cd717d110fa218c46d19e723200278f339
SHA5125423066b7f9b4e55fdff21a23b72c78e60d05a16d0a7e3a05436c8f40d2434de103b04afc5a888e950865f0b3b76ff215f676d64a1c1678dd8fb282e20dc07bd
-
Filesize
323KB
MD537176a2608facbf21a6bf59948cd849c
SHA16a9b02f1ad2d715fca286ab23ec79e3ba21a4370
SHA25630670c0677708a43a55ff310e42280cd717d110fa218c46d19e723200278f339
SHA5125423066b7f9b4e55fdff21a23b72c78e60d05a16d0a7e3a05436c8f40d2434de103b04afc5a888e950865f0b3b76ff215f676d64a1c1678dd8fb282e20dc07bd
-
Filesize
398B
MD595706eda7aae18f0112d1e6e170a9c00
SHA1a61e8ba59ab4758bbfe0c06e6ee3c8f8a719c910
SHA2567c851005841ec8857ccd3c8eb74c47ba26f09d3e375b8a189b80f35065c7628a
SHA51278c744e330a303547602e32106a41f8dddd2d98c4abee5aba10fb31805a6c9f7b99e42d0f8d58c1c42da5e3b003dbbab35b9866502128bc14bdadc75e123a2a2
-
Filesize
721B
MD561df2aac59c00dfd60ca3af3417bb684
SHA19442787f493e5fc0a0ea0d36d65833a7707901b3
SHA256751042bd83edc7d0095c70f8441499b91d2881ea95d0d2ff607b8339b8034536
SHA5123ffaebd898e620589296e8021c9837ae68699ff9039fbb9530a3b41520134c9687a586fea8f28bd7f94e667ecae5987ec6733891f68bc2244960b6968d11da41
-
Filesize
323KB
MD537176a2608facbf21a6bf59948cd849c
SHA16a9b02f1ad2d715fca286ab23ec79e3ba21a4370
SHA25630670c0677708a43a55ff310e42280cd717d110fa218c46d19e723200278f339
SHA5125423066b7f9b4e55fdff21a23b72c78e60d05a16d0a7e3a05436c8f40d2434de103b04afc5a888e950865f0b3b76ff215f676d64a1c1678dd8fb282e20dc07bd
-
Filesize
323KB
MD537176a2608facbf21a6bf59948cd849c
SHA16a9b02f1ad2d715fca286ab23ec79e3ba21a4370
SHA25630670c0677708a43a55ff310e42280cd717d110fa218c46d19e723200278f339
SHA5125423066b7f9b4e55fdff21a23b72c78e60d05a16d0a7e3a05436c8f40d2434de103b04afc5a888e950865f0b3b76ff215f676d64a1c1678dd8fb282e20dc07bd