Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe
Resource
win10v2004-20220901-en
General
-
Target
9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe
-
Size
322KB
-
MD5
d5d3abf7f6bf92c36a27657b957f1eda
-
SHA1
00bdb05ae85f15573168ae2b5c0ea17fc5f65ef3
-
SHA256
9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb
-
SHA512
aa8ee7077f9a6f0950d684ce2f6e6fe2f42987c3f065ecb66ebceb81dbc26127011476b958c8a7602302fc874452f25703752c4322112e9a8de1973e59a0b6bc
-
SSDEEP
6144:f5ADU35zeQ0R7+28O86sgg/QNpZmoZkdkCVLeC2wuJv8200XRRvD+S6GbEJXuh4X:xEa5zeD7+q/mIkdUvV0qRRL76zj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 540 vyarvo.exe 1176 vyarvo.exe -
Deletes itself 1 IoCs
pid Process 1644 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B2FDFC8-3774-AD4D-C411-AE4FF0968D52} = "C:\\Users\\Admin\\AppData\\Roaming\\Kyfeav\\vyarvo.exe" vyarvo.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run vyarvo.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1888 set thread context of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 540 set thread context of 1176 540 vyarvo.exe 30 -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe 1176 vyarvo.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 1888 wrote to memory of 940 1888 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 28 PID 940 wrote to memory of 540 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 29 PID 940 wrote to memory of 540 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 29 PID 940 wrote to memory of 540 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 29 PID 940 wrote to memory of 540 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 29 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 540 wrote to memory of 1176 540 vyarvo.exe 30 PID 1176 wrote to memory of 1128 1176 vyarvo.exe 18 PID 1176 wrote to memory of 1128 1176 vyarvo.exe 18 PID 1176 wrote to memory of 1128 1176 vyarvo.exe 18 PID 1176 wrote to memory of 1128 1176 vyarvo.exe 18 PID 1176 wrote to memory of 1128 1176 vyarvo.exe 18 PID 1176 wrote to memory of 1224 1176 vyarvo.exe 17 PID 1176 wrote to memory of 1224 1176 vyarvo.exe 17 PID 1176 wrote to memory of 1224 1176 vyarvo.exe 17 PID 1176 wrote to memory of 1224 1176 vyarvo.exe 17 PID 1176 wrote to memory of 1224 1176 vyarvo.exe 17 PID 1176 wrote to memory of 1276 1176 vyarvo.exe 9 PID 1176 wrote to memory of 1276 1176 vyarvo.exe 9 PID 940 wrote to memory of 1644 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 31 PID 940 wrote to memory of 1644 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 31 PID 940 wrote to memory of 1644 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 31 PID 940 wrote to memory of 1644 940 9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe 31 PID 1176 wrote to memory of 1276 1176 vyarvo.exe 9 PID 1176 wrote to memory of 1276 1176 vyarvo.exe 9 PID 1176 wrote to memory of 1276 1176 vyarvo.exe 9 PID 1176 wrote to memory of 940 1176 vyarvo.exe 28 PID 1176 wrote to memory of 1644 1176 vyarvo.exe 31 PID 1176 wrote to memory of 1644 1176 vyarvo.exe 31 PID 1176 wrote to memory of 1644 1176 vyarvo.exe 31 PID 1176 wrote to memory of 1644 1176 vyarvo.exe 31 PID 1176 wrote to memory of 1644 1176 vyarvo.exe 31 PID 1176 wrote to memory of 1660 1176 vyarvo.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe"C:\Users\Admin\AppData\Local\Temp\9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe"C:\Users\Admin\AppData\Local\Temp\9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe"C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe"C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp63930846.bat"4⤵
- Deletes itself
PID:1644
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1822157377-614470190119780098-973487695469261956-12314532321411569134876411351"1⤵PID:1660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5b7ff024da133b6c093c4c57e3f7f688e
SHA14ad1af2c7a7067da5e8db48f98940669de69c606
SHA25645bcf59d7ea394d837b861c71c0f6f8fbb8b1377bda07cbb3120a641ffbd8f81
SHA512fb4339a8e73bbc5f563bddb48440410b607c712ddbfb9bbd203a324f03d148171c880bb9d4b4ba838d115c0f921372f1537d51ed8bc9194fbe4ddb0e9ca254b9
-
Filesize
322KB
MD524aa871a5a794473b774a71484905a7e
SHA141f7e8b8633cb9e95ace025a3f6abdc5c7b34437
SHA256f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4
SHA512042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f
-
Filesize
322KB
MD524aa871a5a794473b774a71484905a7e
SHA141f7e8b8633cb9e95ace025a3f6abdc5c7b34437
SHA256f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4
SHA512042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f
-
Filesize
322KB
MD524aa871a5a794473b774a71484905a7e
SHA141f7e8b8633cb9e95ace025a3f6abdc5c7b34437
SHA256f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4
SHA512042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f
-
Filesize
322KB
MD524aa871a5a794473b774a71484905a7e
SHA141f7e8b8633cb9e95ace025a3f6abdc5c7b34437
SHA256f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4
SHA512042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f
-
Filesize
322KB
MD524aa871a5a794473b774a71484905a7e
SHA141f7e8b8633cb9e95ace025a3f6abdc5c7b34437
SHA256f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4
SHA512042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f