Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
225s -
max time network
294s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe
Resource
win10v2004-20220901-en
General
-
Target
664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe
-
Size
322KB
-
MD5
058e932c486c8c3c1c22661561e8a7b7
-
SHA1
e5151ed78dbf1477602f3d952ee8d70539e5c371
-
SHA256
664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6
-
SHA512
a7e1694684684fd342a98543f6357abb4019214ea29e1ffb319379063060c8db73839bd511bccbaf2949150f2dade8469d0dd59d988905e68a676eb17f4a1678
-
SSDEEP
6144:HqcT9nzQPSqzXXpydn3nozW5TFYkI4uLZMGLv+xxxxxxxxxxxxxxxxngxxxxxxxW:HjT9zQPRHYdn34y3IbnLGxxxxxxxxxxp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 572 jocab.exe -
Deletes itself 1 IoCs
pid Process 852 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E8A35E48-3774-AD4D-52EE-D422474DF73F} = "C:\\Users\\Admin\\AppData\\Roaming\\Cujis\\jocab.exe" jocab.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\Currentversion\Run jocab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe 572 jocab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 572 jocab.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1836 wrote to memory of 572 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 28 PID 1836 wrote to memory of 572 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 28 PID 1836 wrote to memory of 572 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 28 PID 1836 wrote to memory of 572 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 28 PID 572 wrote to memory of 1120 572 jocab.exe 17 PID 572 wrote to memory of 1120 572 jocab.exe 17 PID 572 wrote to memory of 1120 572 jocab.exe 17 PID 572 wrote to memory of 1120 572 jocab.exe 17 PID 572 wrote to memory of 1120 572 jocab.exe 17 PID 572 wrote to memory of 1172 572 jocab.exe 16 PID 572 wrote to memory of 1172 572 jocab.exe 16 PID 572 wrote to memory of 1172 572 jocab.exe 16 PID 572 wrote to memory of 1172 572 jocab.exe 16 PID 572 wrote to memory of 1172 572 jocab.exe 16 PID 572 wrote to memory of 1192 572 jocab.exe 15 PID 572 wrote to memory of 1192 572 jocab.exe 15 PID 572 wrote to memory of 1192 572 jocab.exe 15 PID 572 wrote to memory of 1192 572 jocab.exe 15 PID 572 wrote to memory of 1192 572 jocab.exe 15 PID 572 wrote to memory of 1836 572 jocab.exe 14 PID 572 wrote to memory of 1836 572 jocab.exe 14 PID 572 wrote to memory of 1836 572 jocab.exe 14 PID 572 wrote to memory of 1836 572 jocab.exe 14 PID 572 wrote to memory of 1836 572 jocab.exe 14 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 1836 wrote to memory of 852 1836 664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe 29 PID 572 wrote to memory of 1296 572 jocab.exe 30 PID 572 wrote to memory of 1296 572 jocab.exe 30 PID 572 wrote to memory of 1296 572 jocab.exe 30 PID 572 wrote to memory of 1296 572 jocab.exe 30 PID 572 wrote to memory of 1296 572 jocab.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe"C:\Users\Admin\AppData\Local\Temp\664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Roaming\Cujis\jocab.exe"C:\Users\Admin\AppData\Roaming\Cujis\jocab.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp75837057.bat"2⤵
- Deletes itself
PID:852
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "231534636-905708832-1867669841-1017789395-1894105732-74819359611388250851679264239"1⤵PID:1296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466B
MD54567025c2d8b1abcf5a3d01ada367869
SHA1f7d759b1189b71e4049d07ba3cc80e230b15e33c
SHA256ef493499f0f6329498a7cdab3252301f24d6f915f6e2d836e4700e68352d025c
SHA512bf0cd37f64c534a8a7228ed71e82dbf46e0a1a665ad0f20327a54094c16caaaff78d39d5622fabfadfa9714b0bf26e2e043d6a5942172754bb5099be59cac747
-
Filesize
307B
MD54745cf26a14448a7fccf4d41277efbc2
SHA139a00ce5b3e844ec674c9b916a43691b91b89fff
SHA256f528a12b4888c568f330356a7eb87536d6a53216fafa57cb97b58f7303cc11a6
SHA5125856cacfe464cfd08394bbc599155b8fe899e0f4612bd6b13a9c36c35276a6423b73f87417fc110daedfb5e97f7976cdf607ff53b2e4281487fb1f7a92b52e88
-
Filesize
322KB
MD538c6cddc8c15999ceb5d0105e7f147ed
SHA1ff6eb92990a66ea608da20baa5bfb927d7f92f92
SHA256f4ab5bdf129845fa83dd990bdd92fd4ebb3866cd110a696fd16e1fce91a6ad14
SHA512668d6265236df89d9de26f49a42dbd4e7ec4ae74c80163a00f288696b3af8287de6d2ffb4b4705494a745c0f49be121e14008220c3fadce78d90d1486a697258
-
Filesize
322KB
MD538c6cddc8c15999ceb5d0105e7f147ed
SHA1ff6eb92990a66ea608da20baa5bfb927d7f92f92
SHA256f4ab5bdf129845fa83dd990bdd92fd4ebb3866cd110a696fd16e1fce91a6ad14
SHA512668d6265236df89d9de26f49a42dbd4e7ec4ae74c80163a00f288696b3af8287de6d2ffb4b4705494a745c0f49be121e14008220c3fadce78d90d1486a697258
-
Filesize
322KB
MD538c6cddc8c15999ceb5d0105e7f147ed
SHA1ff6eb92990a66ea608da20baa5bfb927d7f92f92
SHA256f4ab5bdf129845fa83dd990bdd92fd4ebb3866cd110a696fd16e1fce91a6ad14
SHA512668d6265236df89d9de26f49a42dbd4e7ec4ae74c80163a00f288696b3af8287de6d2ffb4b4705494a745c0f49be121e14008220c3fadce78d90d1486a697258
-
Filesize
322KB
MD538c6cddc8c15999ceb5d0105e7f147ed
SHA1ff6eb92990a66ea608da20baa5bfb927d7f92f92
SHA256f4ab5bdf129845fa83dd990bdd92fd4ebb3866cd110a696fd16e1fce91a6ad14
SHA512668d6265236df89d9de26f49a42dbd4e7ec4ae74c80163a00f288696b3af8287de6d2ffb4b4705494a745c0f49be121e14008220c3fadce78d90d1486a697258