Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
194s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe
Resource
win10v2004-20221111-en
General
-
Target
7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe
-
Size
330KB
-
MD5
761b9f2aaa41445d70d4fb7faba5f3b0
-
SHA1
0fcbaa8fd4b46df396b41b2273f53e75df46d513
-
SHA256
7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a
-
SHA512
cdc6e44e2164d0d0d0adc0ea894a66d50e560928ef90452e49298f0248e301ec65aa120d5d3f60599d8f11c22504f65c4b45a083aab8d76c2369bf4c3262d075
-
SSDEEP
6144:+xzllL7TuevSlo3TdKQtK6f1g+GcG8DCqabJaqvAz:+5llLdvSl+tK60ctCq4Yz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5112 ubfu.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\Currentversion\Run ubfu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{C3916187-556D-BCA0-4F67-978E82928D8C} = "C:\\Users\\Admin\\AppData\\Roaming\\Xeliqy\\ubfu.exe" ubfu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2864 set thread context of 4480 2864 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 85 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe 5112 ubfu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 5112 2864 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 84 PID 2864 wrote to memory of 5112 2864 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 84 PID 2864 wrote to memory of 5112 2864 7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe 84 PID 5112 wrote to memory of 2760 5112 ubfu.exe 54 PID 5112 wrote to memory of 2760 5112 ubfu.exe 54 PID 5112 wrote to memory of 2760 5112 ubfu.exe 54 PID 5112 wrote to memory of 2760 5112 ubfu.exe 54 PID 5112 wrote to memory of 2760 5112 ubfu.exe 54 PID 5112 wrote to memory of 2788 5112 ubfu.exe 53 PID 5112 wrote to memory of 2788 5112 ubfu.exe 53 PID 5112 wrote to memory of 2788 5112 ubfu.exe 53 PID 5112 wrote to memory of 2788 5112 ubfu.exe 53 PID 5112 wrote to memory of 2788 5112 ubfu.exe 53 PID 5112 wrote to memory of 2868 5112 ubfu.exe 52 PID 5112 wrote to memory of 2868 5112 ubfu.exe 52 PID 5112 wrote to memory of 2868 5112 ubfu.exe 52 PID 5112 wrote to memory of 2868 5112 ubfu.exe 52 PID 5112 wrote to memory of 2868 5112 ubfu.exe 52 PID 5112 wrote to memory of 2584 5112 ubfu.exe 51 PID 5112 wrote to memory of 2584 5112 ubfu.exe 51 PID 5112 wrote to memory of 2584 5112 ubfu.exe 51 PID 5112 wrote to memory of 2584 5112 ubfu.exe 51 PID 5112 wrote to memory of 2584 5112 ubfu.exe 51 PID 5112 wrote to memory of 1388 5112 ubfu.exe 28 PID 5112 wrote to memory of 1388 5112 ubfu.exe 28 PID 5112 wrote to memory of 1388 5112 ubfu.exe 28 PID 5112 wrote to memory of 1388 5112 ubfu.exe 28 PID 5112 wrote to memory of 1388 5112 ubfu.exe 28 PID 5112 wrote to memory of 3252 5112 ubfu.exe 27 PID 5112 wrote to memory of 3252 5112 ubfu.exe 27 PID 5112 wrote to memory of 3252 5112 ubfu.exe 27 PID 5112 wrote to memory of 3252 5112 ubfu.exe 27 PID 5112 wrote to memory of 3252 5112 ubfu.exe 27 PID 5112 wrote to memory of 3344 5112 ubfu.exe 26 PID 5112 wrote to memory of 3344 5112 ubfu.exe 26 PID 5112 wrote to memory of 3344 5112 ubfu.exe 26 PID 5112 wrote to memory of 3344 5112 ubfu.exe 26 PID 5112 wrote to memory of 3344 5112 ubfu.exe 26 PID 5112 wrote to memory of 3408 5112 ubfu.exe 25 PID 5112 wrote to memory of 3408 5112 ubfu.exe 25 PID 5112 wrote to memory of 3408 5112 ubfu.exe 25 PID 5112 wrote to memory of 3408 5112 ubfu.exe 25 PID 5112 wrote to memory of 3408 5112 ubfu.exe 25 PID 5112 wrote to memory of 3504 5112 ubfu.exe 50 PID 5112 wrote to memory of 3504 5112 ubfu.exe 50 PID 5112 wrote to memory of 3504 5112 ubfu.exe 50 PID 5112 wrote to memory of 3504 5112 ubfu.exe 50 PID 5112 wrote to memory of 3504 5112 ubfu.exe 50 PID 5112 wrote to memory of 3692 5112 ubfu.exe 49 PID 5112 wrote to memory of 3692 5112 ubfu.exe 49 PID 5112 wrote to memory of 3692 5112 ubfu.exe 49 PID 5112 wrote to memory of 3692 5112 ubfu.exe 49 PID 5112 wrote to memory of 3692 5112 ubfu.exe 49 PID 5112 wrote to memory of 4668 5112 ubfu.exe 46 PID 5112 wrote to memory of 4668 5112 ubfu.exe 46 PID 5112 wrote to memory of 4668 5112 ubfu.exe 46 PID 5112 wrote to memory of 4668 5112 ubfu.exe 46 PID 5112 wrote to memory of 4668 5112 ubfu.exe 46 PID 5112 wrote to memory of 456 5112 ubfu.exe 32 PID 5112 wrote to memory of 456 5112 ubfu.exe 32 PID 5112 wrote to memory of 456 5112 ubfu.exe 32 PID 5112 wrote to memory of 456 5112 ubfu.exe 32 PID 5112 wrote to memory of 456 5112 ubfu.exe 32 PID 5112 wrote to memory of 4908 5112 ubfu.exe 30
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3408
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3344
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:1388
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4908
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:456
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4668
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3692
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3504
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe"C:\Users\Admin\AppData\Local\Temp\7729834d91e0d9d8f6d8b6f002a7471987a4b63ec3a2c1956b6e6794365e1b3a.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\Xeliqy\ubfu.exe"C:\Users\Admin\AppData\Roaming\Xeliqy\ubfu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc1fef58f.bat"3⤵PID:4480
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2788
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2760
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4192
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4248
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:648
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3524
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:5100
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:3128
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD529f883f865d1bd8b4f2a9b8d4b975441
SHA1db508a0523ba71e8a02ec424fa56fabf0cb017fe
SHA2563890c051c5a5cf83fe77606f9596b1a3121fe90c8512d45d3542e798aafea6ce
SHA51248f6dd141b7c8d4e3f1303e9ecd36d6dc5439ed2c26983d9858ea24a436b0cbd47e3f62a6246b1372ae3124f7b9bc6081e6df76106f3e20b9e714c5ff2558e83
-
Filesize
330KB
MD5a8d4849b58256b6588cc7e494f11c7a3
SHA1ab679c3bd5f1774b70fa17c6997c40e284e7d297
SHA256fedc77095f2cac395661c6399a22a1bd7a9daed0b59ea478f32c384131224758
SHA5125abe9416d04fa854f4b76f79fa99ab533e4244e85207cc664c7d42c00c452225ddb0233d1c33c9bd9948926de4f4c67d477f92b64ffcf4ceb8fefac60cfb79d7
-
Filesize
330KB
MD5a8d4849b58256b6588cc7e494f11c7a3
SHA1ab679c3bd5f1774b70fa17c6997c40e284e7d297
SHA256fedc77095f2cac395661c6399a22a1bd7a9daed0b59ea478f32c384131224758
SHA5125abe9416d04fa854f4b76f79fa99ab533e4244e85207cc664c7d42c00c452225ddb0233d1c33c9bd9948926de4f4c67d477f92b64ffcf4ceb8fefac60cfb79d7