Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe
Resource
win10v2004-20221111-en
General
-
Target
7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe
-
Size
183KB
-
MD5
65acc5a3a0c9b7aad29e3d3ff64691a7
-
SHA1
3e12eb0c6a4032b44008ff7f23b9ded73b8d06ae
-
SHA256
7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914
-
SHA512
aec411b23bb254f81620d29327a8661a57deccf0abae498980fd6bd3ee8831dd6e0b3fa3fbb165764389a4e3d2a74f0ce4af470a28b220efc1d7dc710ce48553
-
SSDEEP
3072:6pMG+JvtcknLUAiow8j5pLxiASDTVnrTOvBnRltfjx37Wfzg1pNVjW:mMbRukLcled2TtrsBpV7Wfzg1DVi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1400 xiakb.exe 680 xiakb.exe -
Deletes itself 1 IoCs
pid Process 972 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run xiakb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run xiakb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zypiylloc = "C:\\Users\\Admin\\AppData\\Roaming\\Weuzca\\xiakb.exe" xiakb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1376 set thread context of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1400 set thread context of 680 1400 xiakb.exe 30 PID 940 set thread context of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\73AC1FEF-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe 680 xiakb.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeSecurityPrivilege 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe Token: SeSecurityPrivilege 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe Token: SeSecurityPrivilege 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe Token: SeSecurityPrivilege 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe Token: SeSecurityPrivilege 972 cmd.exe Token: SeSecurityPrivilege 972 cmd.exe Token: SeSecurityPrivilege 972 cmd.exe Token: SeSecurityPrivilege 972 cmd.exe Token: SeSecurityPrivilege 972 cmd.exe Token: SeSecurityPrivilege 972 cmd.exe Token: SeSecurityPrivilege 972 cmd.exe Token: SeManageVolumePrivilege 1704 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1704 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1704 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 1376 wrote to memory of 940 1376 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 28 PID 940 wrote to memory of 1400 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 29 PID 940 wrote to memory of 1400 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 29 PID 940 wrote to memory of 1400 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 29 PID 940 wrote to memory of 1400 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 29 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 1400 wrote to memory of 680 1400 xiakb.exe 30 PID 680 wrote to memory of 1124 680 xiakb.exe 17 PID 680 wrote to memory of 1124 680 xiakb.exe 17 PID 680 wrote to memory of 1124 680 xiakb.exe 17 PID 680 wrote to memory of 1124 680 xiakb.exe 17 PID 680 wrote to memory of 1124 680 xiakb.exe 17 PID 680 wrote to memory of 1192 680 xiakb.exe 16 PID 680 wrote to memory of 1192 680 xiakb.exe 16 PID 680 wrote to memory of 1192 680 xiakb.exe 16 PID 680 wrote to memory of 1192 680 xiakb.exe 16 PID 680 wrote to memory of 1192 680 xiakb.exe 16 PID 680 wrote to memory of 1268 680 xiakb.exe 15 PID 680 wrote to memory of 1268 680 xiakb.exe 15 PID 680 wrote to memory of 1268 680 xiakb.exe 15 PID 680 wrote to memory of 1268 680 xiakb.exe 15 PID 680 wrote to memory of 1268 680 xiakb.exe 15 PID 680 wrote to memory of 940 680 xiakb.exe 28 PID 680 wrote to memory of 940 680 xiakb.exe 28 PID 680 wrote to memory of 940 680 xiakb.exe 28 PID 680 wrote to memory of 940 680 xiakb.exe 28 PID 680 wrote to memory of 940 680 xiakb.exe 28 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 940 wrote to memory of 972 940 7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe 31 PID 680 wrote to memory of 1968 680 xiakb.exe 32 PID 680 wrote to memory of 1968 680 xiakb.exe 32 PID 680 wrote to memory of 1968 680 xiakb.exe 32 PID 680 wrote to memory of 1968 680 xiakb.exe 32 PID 680 wrote to memory of 1968 680 xiakb.exe 32 PID 680 wrote to memory of 292 680 xiakb.exe 33 PID 680 wrote to memory of 292 680 xiakb.exe 33 PID 680 wrote to memory of 292 680 xiakb.exe 33 PID 680 wrote to memory of 292 680 xiakb.exe 33 PID 680 wrote to memory of 292 680 xiakb.exe 33 PID 680 wrote to memory of 1704 680 xiakb.exe 34 PID 680 wrote to memory of 1704 680 xiakb.exe 34 PID 680 wrote to memory of 1704 680 xiakb.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe"C:\Users\Admin\AppData\Local\Temp\7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exeC:\Users\Admin\AppData\Local\Temp\7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe"C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exeC:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf27566a2.bat"4⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1859174906-6570579231492835977-18459092971135926192-177466481660024591-773999302"1⤵PID:1968
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:292
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1704
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1172
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:996
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1908
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5d2bd14d701b5423566a6d321c0da180e
SHA183db0cd3f2e1fde15f5d5ba95c350ee952774ea5
SHA2565ae6d419bce19015112823888109d70c2c97efcd23e46518cc9dcb881a23f7fc
SHA512c67d1bb7d1f62c2eaa578f580d4eb097017ba779e47d51f579fdd81fa9b041d62c31c3d6f5d3cc2a95eec261e95a4305453abf3858aa66e4962f123b50fdd4e8
-
Filesize
421B
MD55521ab188e3c3b236812bdc4417d404b
SHA1bfafe028a185b243ab610e05f20be4c7ecf5af90
SHA256ea081ba38bda0ff7ef71cf57ccf9bd689ce9a5ed4dcc3935283035b51b1c5612
SHA512fb27689857590b5d2905d1d37099a47dc6a7dd7b5933d86e51840670f58a28fd256264b8a7d1600b4f8cdfb81bbd326cd50c6f1bc772e35ef1c7c2db929ea9de
-
Filesize
842B
MD5ccca7c03aadf27000d72ca88c53a2847
SHA1451113bea31fa440fda05e6b5d7ad3e68c7d5a35
SHA2565d6290da21200a7db303859588664dd50e9155129006d1c5da387ae0c6eb3aad
SHA512996d3abfeae26014be8e48473603eaa11de5d12e75af51f2d4a6a7242e36161a070ca133469c0cd6ed51419f704114ab233ca4a53ac5da8f3c0650d9e1e7e5d8
-
Filesize
183KB
MD5994cbe1da3e61c8f1f0eb6b9125ced2f
SHA1878b32279eaade5a83d21f03f2056425ef6d592a
SHA256f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3
SHA51236b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687
-
Filesize
183KB
MD5994cbe1da3e61c8f1f0eb6b9125ced2f
SHA1878b32279eaade5a83d21f03f2056425ef6d592a
SHA256f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3
SHA51236b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687
-
Filesize
183KB
MD5994cbe1da3e61c8f1f0eb6b9125ced2f
SHA1878b32279eaade5a83d21f03f2056425ef6d592a
SHA256f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3
SHA51236b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687
-
Filesize
183KB
MD5994cbe1da3e61c8f1f0eb6b9125ced2f
SHA1878b32279eaade5a83d21f03f2056425ef6d592a
SHA256f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3
SHA51236b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687
-
Filesize
183KB
MD5994cbe1da3e61c8f1f0eb6b9125ced2f
SHA1878b32279eaade5a83d21f03f2056425ef6d592a
SHA256f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3
SHA51236b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687