Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe
Resource
win10v2004-20221111-en
General
-
Target
7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe
-
Size
330KB
-
MD5
761b9f2aaa41445d70d4fb7faba5f3b0
-
SHA1
0fcbaa8fd4b46df396b41b2273f53e75df46d513
-
SHA256
7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a
-
SHA512
cdc6e44e2164d0d0d0adc0ea894a66d50e560928ef90452e49298f0248e301ec65aa120d5d3f60599d8f11c22504f65c4b45a083aab8d76c2369bf4c3262d075
-
SSDEEP
6144:+xzllL7TuevSlo3TdKQtK6f1g+GcG8DCqabJaqvAz:+5llLdvSl+tK60ctCq4Yz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1720 viowa.exe -
Deletes itself 1 IoCs
pid Process 676 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run viowa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Ydcude\\viowa.exe" viowa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1052 set thread context of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe 1720 viowa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 1720 viowa.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1720 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 28 PID 1052 wrote to memory of 1720 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 28 PID 1052 wrote to memory of 1720 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 28 PID 1052 wrote to memory of 1720 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 28 PID 1720 wrote to memory of 1116 1720 viowa.exe 9 PID 1720 wrote to memory of 1116 1720 viowa.exe 9 PID 1720 wrote to memory of 1116 1720 viowa.exe 9 PID 1720 wrote to memory of 1116 1720 viowa.exe 9 PID 1720 wrote to memory of 1116 1720 viowa.exe 9 PID 1720 wrote to memory of 1176 1720 viowa.exe 17 PID 1720 wrote to memory of 1176 1720 viowa.exe 17 PID 1720 wrote to memory of 1176 1720 viowa.exe 17 PID 1720 wrote to memory of 1176 1720 viowa.exe 17 PID 1720 wrote to memory of 1176 1720 viowa.exe 17 PID 1720 wrote to memory of 1216 1720 viowa.exe 16 PID 1720 wrote to memory of 1216 1720 viowa.exe 16 PID 1720 wrote to memory of 1216 1720 viowa.exe 16 PID 1720 wrote to memory of 1216 1720 viowa.exe 16 PID 1720 wrote to memory of 1216 1720 viowa.exe 16 PID 1720 wrote to memory of 1052 1720 viowa.exe 27 PID 1720 wrote to memory of 1052 1720 viowa.exe 27 PID 1720 wrote to memory of 1052 1720 viowa.exe 27 PID 1720 wrote to memory of 1052 1720 viowa.exe 27 PID 1720 wrote to memory of 1052 1720 viowa.exe 27 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29 PID 1052 wrote to memory of 676 1052 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe"C:\Users\Admin\AppData\Local\Temp\7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Roaming\Ydcude\viowa.exe"C:\Users\Admin\AppData\Roaming\Ydcude\viowa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpaa1ff9ba.bat"3⤵
- Deletes itself
PID:676
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5a0a1f3e981e4903bab8488af8b69bc20
SHA12308e04cbaa2e35e4aa1ea60c584c40b6695ac96
SHA25685bcab0a39a34618200e08d4e3b2f4dd52ccc18eefab4770d36aa1188e3ffdba
SHA512321784d25d0132c28b075489632048089d743c5d9d899d10d40fa12f71decc4e08e9427fcf16f5397a3bc09ae9b12ddd5684ed2eec41ba998d13dca154ea5525
-
Filesize
330KB
MD5de066fff3f264104a53d6f1d9d382c31
SHA12f5ccd33a6274f4cc7a3223dbcd481f71e2f1893
SHA2565a7036f6965b557b20122127b84e5803fb7751764f3797aa8576741d73b7d74a
SHA512620ef37594c375a12c03c7842b99cf704422a629fd23564542d01c44b1dd9c2d6cb8264bda5b1caac23346e000b49bdd02907654f1a4f9a8affee3ddf669356c
-
Filesize
330KB
MD5de066fff3f264104a53d6f1d9d382c31
SHA12f5ccd33a6274f4cc7a3223dbcd481f71e2f1893
SHA2565a7036f6965b557b20122127b84e5803fb7751764f3797aa8576741d73b7d74a
SHA512620ef37594c375a12c03c7842b99cf704422a629fd23564542d01c44b1dd9c2d6cb8264bda5b1caac23346e000b49bdd02907654f1a4f9a8affee3ddf669356c
-
Filesize
330KB
MD5de066fff3f264104a53d6f1d9d382c31
SHA12f5ccd33a6274f4cc7a3223dbcd481f71e2f1893
SHA2565a7036f6965b557b20122127b84e5803fb7751764f3797aa8576741d73b7d74a
SHA512620ef37594c375a12c03c7842b99cf704422a629fd23564542d01c44b1dd9c2d6cb8264bda5b1caac23346e000b49bdd02907654f1a4f9a8affee3ddf669356c