Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    225s
  • max time network
    294s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 05:17

General

  • Target

    664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe

  • Size

    322KB

  • MD5

    058e932c486c8c3c1c22661561e8a7b7

  • SHA1

    e5151ed78dbf1477602f3d952ee8d70539e5c371

  • SHA256

    664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6

  • SHA512

    a7e1694684684fd342a98543f6357abb4019214ea29e1ffb319379063060c8db73839bd511bccbaf2949150f2dade8469d0dd59d988905e68a676eb17f4a1678

  • SSDEEP

    6144:HqcT9nzQPSqzXXpydn3nozW5TFYkI4uLZMGLv+xxxxxxxxxxxxxxxxngxxxxxxxW:HjT9zQPRHYdn34y3IbnLGxxxxxxxxxxp

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe
    "C:\Users\Admin\AppData\Local\Temp\664e21a261a44b74f20cb32edf0513d9746dd6427f64d9976f5e7d8efb98dbd6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\AppData\Roaming\Cujis\jocab.exe
      "C:\Users\Admin\AppData\Roaming\Cujis\jocab.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:572
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp75837057.bat"
      2⤵
      • Deletes itself
      PID:852
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1120
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "231534636-905708832-1867669841-1017789395-1894105732-74819359611388250851679264239"
          1⤵
            PID:1296

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\agyhdi.myr

            Filesize

            466B

            MD5

            4567025c2d8b1abcf5a3d01ada367869

            SHA1

            f7d759b1189b71e4049d07ba3cc80e230b15e33c

            SHA256

            ef493499f0f6329498a7cdab3252301f24d6f915f6e2d836e4700e68352d025c

            SHA512

            bf0cd37f64c534a8a7228ed71e82dbf46e0a1a665ad0f20327a54094c16caaaff78d39d5622fabfadfa9714b0bf26e2e043d6a5942172754bb5099be59cac747

          • C:\Users\Admin\AppData\Local\Temp\tmp75837057.bat

            Filesize

            307B

            MD5

            4745cf26a14448a7fccf4d41277efbc2

            SHA1

            39a00ce5b3e844ec674c9b916a43691b91b89fff

            SHA256

            f528a12b4888c568f330356a7eb87536d6a53216fafa57cb97b58f7303cc11a6

            SHA512

            5856cacfe464cfd08394bbc599155b8fe899e0f4612bd6b13a9c36c35276a6423b73f87417fc110daedfb5e97f7976cdf607ff53b2e4281487fb1f7a92b52e88

          • C:\Users\Admin\AppData\Roaming\Cujis\jocab.exe

            Filesize

            322KB

            MD5

            38c6cddc8c15999ceb5d0105e7f147ed

            SHA1

            ff6eb92990a66ea608da20baa5bfb927d7f92f92

            SHA256

            f4ab5bdf129845fa83dd990bdd92fd4ebb3866cd110a696fd16e1fce91a6ad14

            SHA512

            668d6265236df89d9de26f49a42dbd4e7ec4ae74c80163a00f288696b3af8287de6d2ffb4b4705494a745c0f49be121e14008220c3fadce78d90d1486a697258

          • C:\Users\Admin\AppData\Roaming\Cujis\jocab.exe

            Filesize

            322KB

            MD5

            38c6cddc8c15999ceb5d0105e7f147ed

            SHA1

            ff6eb92990a66ea608da20baa5bfb927d7f92f92

            SHA256

            f4ab5bdf129845fa83dd990bdd92fd4ebb3866cd110a696fd16e1fce91a6ad14

            SHA512

            668d6265236df89d9de26f49a42dbd4e7ec4ae74c80163a00f288696b3af8287de6d2ffb4b4705494a745c0f49be121e14008220c3fadce78d90d1486a697258

          • \Users\Admin\AppData\Roaming\Cujis\jocab.exe

            Filesize

            322KB

            MD5

            38c6cddc8c15999ceb5d0105e7f147ed

            SHA1

            ff6eb92990a66ea608da20baa5bfb927d7f92f92

            SHA256

            f4ab5bdf129845fa83dd990bdd92fd4ebb3866cd110a696fd16e1fce91a6ad14

            SHA512

            668d6265236df89d9de26f49a42dbd4e7ec4ae74c80163a00f288696b3af8287de6d2ffb4b4705494a745c0f49be121e14008220c3fadce78d90d1486a697258

          • \Users\Admin\AppData\Roaming\Cujis\jocab.exe

            Filesize

            322KB

            MD5

            38c6cddc8c15999ceb5d0105e7f147ed

            SHA1

            ff6eb92990a66ea608da20baa5bfb927d7f92f92

            SHA256

            f4ab5bdf129845fa83dd990bdd92fd4ebb3866cd110a696fd16e1fce91a6ad14

            SHA512

            668d6265236df89d9de26f49a42dbd4e7ec4ae74c80163a00f288696b3af8287de6d2ffb4b4705494a745c0f49be121e14008220c3fadce78d90d1486a697258

          • memory/572-102-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/572-83-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/572-81-0x0000000001C20000-0x0000000001C75000-memory.dmp

            Filesize

            340KB

          • memory/572-79-0x0000000000280000-0x00000000002C2000-memory.dmp

            Filesize

            264KB

          • memory/852-99-0x00000000000C0000-0x0000000000102000-memory.dmp

            Filesize

            264KB

          • memory/852-115-0x00000000000C0000-0x0000000000102000-memory.dmp

            Filesize

            264KB

          • memory/852-98-0x00000000000C0000-0x0000000000102000-memory.dmp

            Filesize

            264KB

          • memory/852-96-0x00000000000C0000-0x0000000000102000-memory.dmp

            Filesize

            264KB

          • memory/852-100-0x00000000000C0000-0x0000000000102000-memory.dmp

            Filesize

            264KB

          • memory/1120-65-0x0000000001CA0000-0x0000000001CE2000-memory.dmp

            Filesize

            264KB

          • memory/1120-70-0x0000000001CA0000-0x0000000001CE2000-memory.dmp

            Filesize

            264KB

          • memory/1120-69-0x0000000001CA0000-0x0000000001CE2000-memory.dmp

            Filesize

            264KB

          • memory/1120-68-0x0000000001CA0000-0x0000000001CE2000-memory.dmp

            Filesize

            264KB

          • memory/1120-67-0x0000000001CA0000-0x0000000001CE2000-memory.dmp

            Filesize

            264KB

          • memory/1172-73-0x0000000001B50000-0x0000000001B92000-memory.dmp

            Filesize

            264KB

          • memory/1172-76-0x0000000001B50000-0x0000000001B92000-memory.dmp

            Filesize

            264KB

          • memory/1172-75-0x0000000001B50000-0x0000000001B92000-memory.dmp

            Filesize

            264KB

          • memory/1172-74-0x0000000001B50000-0x0000000001B92000-memory.dmp

            Filesize

            264KB

          • memory/1192-82-0x0000000002A90000-0x0000000002AD2000-memory.dmp

            Filesize

            264KB

          • memory/1192-84-0x0000000002A90000-0x0000000002AD2000-memory.dmp

            Filesize

            264KB

          • memory/1192-86-0x0000000002A90000-0x0000000002AD2000-memory.dmp

            Filesize

            264KB

          • memory/1192-85-0x0000000002A90000-0x0000000002AD2000-memory.dmp

            Filesize

            264KB

          • memory/1296-114-0x0000000001B70000-0x0000000001BB2000-memory.dmp

            Filesize

            264KB

          • memory/1296-113-0x0000000001B70000-0x0000000001BB2000-memory.dmp

            Filesize

            264KB

          • memory/1296-112-0x0000000001B70000-0x0000000001BB2000-memory.dmp

            Filesize

            264KB

          • memory/1296-111-0x0000000001B70000-0x0000000001BB2000-memory.dmp

            Filesize

            264KB

          • memory/1836-77-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/1836-106-0x00000000021F0000-0x0000000002232000-memory.dmp

            Filesize

            264KB

          • memory/1836-101-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/1836-89-0x00000000021F0000-0x0000000002232000-memory.dmp

            Filesize

            264KB

          • memory/1836-58-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1836-104-0x0000000000380000-0x00000000003D5000-memory.dmp

            Filesize

            340KB

          • memory/1836-105-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1836-54-0x0000000075151000-0x0000000075153000-memory.dmp

            Filesize

            8KB

          • memory/1836-57-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/1836-93-0x00000000021F0000-0x0000000002245000-memory.dmp

            Filesize

            340KB

          • memory/1836-92-0x00000000021F0000-0x0000000002232000-memory.dmp

            Filesize

            264KB

          • memory/1836-90-0x00000000021F0000-0x0000000002232000-memory.dmp

            Filesize

            264KB

          • memory/1836-91-0x00000000021F0000-0x0000000002232000-memory.dmp

            Filesize

            264KB

          • memory/1836-56-0x0000000000380000-0x00000000003D5000-memory.dmp

            Filesize

            340KB

          • memory/1836-55-0x00000000002B0000-0x00000000002F2000-memory.dmp

            Filesize

            264KB