Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe
Resource
win10v2004-20220901-en
General
-
Target
88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe
-
Size
423KB
-
MD5
61a28ab4086db27d3cdc7376f5a69998
-
SHA1
a9de95c9d407abba3995a3a16a720913b8bab526
-
SHA256
88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d
-
SHA512
9ee6f1d3b178ab12ed3f09fa741d91091e43bbf6fd9a3bc5789f99dfc6a79a113bf3d9ee8ec1263e5d3e3e12d30cfe9ea5a44f63073b0dc002951016b389d3c0
-
SSDEEP
12288:W/O0T9PLWQhwpgIdA/t5tV8xjsgBov6/vYXubE/Wd:fQZ/0jdH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 ytimaj.exe -
Deletes itself 1 IoCs
pid Process 1732 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run ytimaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Ukaz\\ytimaj.exe" ytimaj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1768 set thread context of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe 1316 ytimaj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 1316 ytimaj.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1316 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 27 PID 1768 wrote to memory of 1316 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 27 PID 1768 wrote to memory of 1316 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 27 PID 1768 wrote to memory of 1316 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 27 PID 1316 wrote to memory of 1112 1316 ytimaj.exe 16 PID 1316 wrote to memory of 1112 1316 ytimaj.exe 16 PID 1316 wrote to memory of 1112 1316 ytimaj.exe 16 PID 1316 wrote to memory of 1112 1316 ytimaj.exe 16 PID 1316 wrote to memory of 1112 1316 ytimaj.exe 16 PID 1316 wrote to memory of 1176 1316 ytimaj.exe 15 PID 1316 wrote to memory of 1176 1316 ytimaj.exe 15 PID 1316 wrote to memory of 1176 1316 ytimaj.exe 15 PID 1316 wrote to memory of 1176 1316 ytimaj.exe 15 PID 1316 wrote to memory of 1176 1316 ytimaj.exe 15 PID 1316 wrote to memory of 1204 1316 ytimaj.exe 14 PID 1316 wrote to memory of 1204 1316 ytimaj.exe 14 PID 1316 wrote to memory of 1204 1316 ytimaj.exe 14 PID 1316 wrote to memory of 1204 1316 ytimaj.exe 14 PID 1316 wrote to memory of 1204 1316 ytimaj.exe 14 PID 1316 wrote to memory of 1768 1316 ytimaj.exe 19 PID 1316 wrote to memory of 1768 1316 ytimaj.exe 19 PID 1316 wrote to memory of 1768 1316 ytimaj.exe 19 PID 1316 wrote to memory of 1768 1316 ytimaj.exe 19 PID 1316 wrote to memory of 1768 1316 ytimaj.exe 19 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28 PID 1768 wrote to memory of 1732 1768 88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe"C:\Users\Admin\AppData\Local\Temp\88b72e9e01452158ce71cef25e61bf2de0b30fc79fb794f25698446b3394718d.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Roaming\Ukaz\ytimaj.exe"C:\Users\Admin\AppData\Roaming\Ukaz\ytimaj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6be90719.bat"3⤵
- Deletes itself
PID:1732
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD519b8d4c496c80267037ec33a0e3e76fd
SHA1f892518f082f5e73e0785724379d7fae5ca0b2da
SHA2565948bd706400ba3b5f9a444119f1e218e40e4b53ce07cf3df0974df01a51e997
SHA51274563deaede54a17b4f9cdc0726fb2dcdb67a88899e5bf4f23abdeda66e279fee55196c6fabbcfa9d2df2e5f136036ff9bfafb2c2edf1263cc019fcb0a797cfd
-
Filesize
423KB
MD52ed9c01ebf6ea25d76b21005a778b0e9
SHA15343234ad79d358b763095753a83bbc39f7f5b73
SHA25635e409016eb35d6f37b26fee157e8f1495b797067286c49314ecdaf553fe6a24
SHA51293d92393c7feb829d7282215946a374074d2640436cdb9926bae00dfdc445eb6f2fe1caaecf648ae97b02911cecf19d32754a79089bde063f86f66a17a002af3
-
Filesize
423KB
MD52ed9c01ebf6ea25d76b21005a778b0e9
SHA15343234ad79d358b763095753a83bbc39f7f5b73
SHA25635e409016eb35d6f37b26fee157e8f1495b797067286c49314ecdaf553fe6a24
SHA51293d92393c7feb829d7282215946a374074d2640436cdb9926bae00dfdc445eb6f2fe1caaecf648ae97b02911cecf19d32754a79089bde063f86f66a17a002af3
-
Filesize
423KB
MD52ed9c01ebf6ea25d76b21005a778b0e9
SHA15343234ad79d358b763095753a83bbc39f7f5b73
SHA25635e409016eb35d6f37b26fee157e8f1495b797067286c49314ecdaf553fe6a24
SHA51293d92393c7feb829d7282215946a374074d2640436cdb9926bae00dfdc445eb6f2fe1caaecf648ae97b02911cecf19d32754a79089bde063f86f66a17a002af3