Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe
Resource
win10v2004-20220901-en
General
-
Target
787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe
-
Size
286KB
-
MD5
9e9c43815fb604920a6b717ccfa9a716
-
SHA1
fd7c64d167347be295cf062d6a5a663f586055fb
-
SHA256
787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a
-
SHA512
31a48007c0dcac7fab4ceead52f2f915e8b6786fa81719b226a823a45bded9adc7cc160f74c2a1e296587ea2b5cd51ff311b3b10dadf89a50fc944570e19ea95
-
SSDEEP
6144:bZdsYD13C6GCwQsXpDI07b9/gGkwCUJJ2u/2EhOjRWzF8xtI:9dB13QCpKIUb9/xBQu/bORWz6Y
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1240 noimm.exe 560 noimm.exe -
Deletes itself 1 IoCs
pid Process 1100 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run noimm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B2FDFC8-3774-AD4D-C411-AE4FF0968D52} = "C:\\Users\\Admin\\AppData\\Roaming\\Ytuv\\noimm.exe" noimm.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 956 set thread context of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 1240 set thread context of 560 1240 noimm.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe 560 noimm.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 956 wrote to memory of 284 956 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 28 PID 284 wrote to memory of 1240 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 29 PID 284 wrote to memory of 1240 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 29 PID 284 wrote to memory of 1240 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 29 PID 284 wrote to memory of 1240 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 29 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 1240 wrote to memory of 560 1240 noimm.exe 30 PID 560 wrote to memory of 1128 560 noimm.exe 18 PID 560 wrote to memory of 1128 560 noimm.exe 18 PID 560 wrote to memory of 1128 560 noimm.exe 18 PID 560 wrote to memory of 1128 560 noimm.exe 18 PID 560 wrote to memory of 1128 560 noimm.exe 18 PID 560 wrote to memory of 1188 560 noimm.exe 17 PID 560 wrote to memory of 1188 560 noimm.exe 17 PID 560 wrote to memory of 1188 560 noimm.exe 17 PID 560 wrote to memory of 1188 560 noimm.exe 17 PID 560 wrote to memory of 1188 560 noimm.exe 17 PID 560 wrote to memory of 1252 560 noimm.exe 15 PID 560 wrote to memory of 1252 560 noimm.exe 15 PID 560 wrote to memory of 1252 560 noimm.exe 15 PID 560 wrote to memory of 1252 560 noimm.exe 15 PID 560 wrote to memory of 1252 560 noimm.exe 15 PID 560 wrote to memory of 284 560 noimm.exe 28 PID 560 wrote to memory of 284 560 noimm.exe 28 PID 560 wrote to memory of 284 560 noimm.exe 28 PID 560 wrote to memory of 284 560 noimm.exe 28 PID 560 wrote to memory of 284 560 noimm.exe 28 PID 284 wrote to memory of 1100 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 31 PID 284 wrote to memory of 1100 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 31 PID 284 wrote to memory of 1100 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 31 PID 284 wrote to memory of 1100 284 787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe 31 PID 560 wrote to memory of 1100 560 noimm.exe 31 PID 560 wrote to memory of 1100 560 noimm.exe 31 PID 560 wrote to memory of 1100 560 noimm.exe 31 PID 560 wrote to memory of 1100 560 noimm.exe 31 PID 560 wrote to memory of 1100 560 noimm.exe 31 PID 560 wrote to memory of 1592 560 noimm.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe"C:\Users\Admin\AppData\Local\Temp\787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe"C:\Users\Admin\AppData\Local\Temp\787ad63499599cf54c2fb5755d1b4883f5fdfebc1b033923a2ef4f4d977f588a.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Users\Admin\AppData\Roaming\Ytuv\noimm.exe"C:\Users\Admin\AppData\Roaming\Ytuv\noimm.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\Ytuv\noimm.exe"C:\Users\Admin\AppData\Roaming\Ytuv\noimm.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:560
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp71236f4f.bat"4⤵
- Deletes itself
PID:1100
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "371639937-1550695799392767421066594319-41650781-1145440702-3288159681746029166"1⤵PID:1592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD55e1154f663acccc1b4b003ec2afd5566
SHA1df19c39f2574dc917dbe76c58ff9086814be4eaf
SHA25629f992000b9cc799288c88007589e87563398490d4430b4adec0b48fa8af5b33
SHA51206756069f3c954005672b3573498cf14e7bebcc07306daa74cc50d61cb1ca65d1a4d00db13bd4ad60976f30d8e5a988ce93f1a74e41c1783ff2041ba5bd80c9a
-
Filesize
286KB
MD5ebc2f3045f500bff9f21d52058d4c154
SHA120dd2e1a29824190d87bff2fa9bd2549f4e2b343
SHA2560b07a5d84c52f85d4169ca14d5495da1d64bee09cb3ce862b893420981068cd2
SHA512641413ec58b5569401fd18f4e5fc968e66e1009e2db01c3ace4b8cb9f4f5952753fbd6e604f7efdc194625ddc02276db2859bb68fc7555742a3f72fc6305fd01
-
Filesize
286KB
MD5ebc2f3045f500bff9f21d52058d4c154
SHA120dd2e1a29824190d87bff2fa9bd2549f4e2b343
SHA2560b07a5d84c52f85d4169ca14d5495da1d64bee09cb3ce862b893420981068cd2
SHA512641413ec58b5569401fd18f4e5fc968e66e1009e2db01c3ace4b8cb9f4f5952753fbd6e604f7efdc194625ddc02276db2859bb68fc7555742a3f72fc6305fd01
-
Filesize
286KB
MD5ebc2f3045f500bff9f21d52058d4c154
SHA120dd2e1a29824190d87bff2fa9bd2549f4e2b343
SHA2560b07a5d84c52f85d4169ca14d5495da1d64bee09cb3ce862b893420981068cd2
SHA512641413ec58b5569401fd18f4e5fc968e66e1009e2db01c3ace4b8cb9f4f5952753fbd6e604f7efdc194625ddc02276db2859bb68fc7555742a3f72fc6305fd01
-
Filesize
286KB
MD5ebc2f3045f500bff9f21d52058d4c154
SHA120dd2e1a29824190d87bff2fa9bd2549f4e2b343
SHA2560b07a5d84c52f85d4169ca14d5495da1d64bee09cb3ce862b893420981068cd2
SHA512641413ec58b5569401fd18f4e5fc968e66e1009e2db01c3ace4b8cb9f4f5952753fbd6e604f7efdc194625ddc02276db2859bb68fc7555742a3f72fc6305fd01
-
Filesize
286KB
MD5ebc2f3045f500bff9f21d52058d4c154
SHA120dd2e1a29824190d87bff2fa9bd2549f4e2b343
SHA2560b07a5d84c52f85d4169ca14d5495da1d64bee09cb3ce862b893420981068cd2
SHA512641413ec58b5569401fd18f4e5fc968e66e1009e2db01c3ace4b8cb9f4f5952753fbd6e604f7efdc194625ddc02276db2859bb68fc7555742a3f72fc6305fd01