Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 00:40

General

  • Target

    9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe

  • Size

    322KB

  • MD5

    d5d3abf7f6bf92c36a27657b957f1eda

  • SHA1

    00bdb05ae85f15573168ae2b5c0ea17fc5f65ef3

  • SHA256

    9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb

  • SHA512

    aa8ee7077f9a6f0950d684ce2f6e6fe2f42987c3f065ecb66ebceb81dbc26127011476b958c8a7602302fc874452f25703752c4322112e9a8de1973e59a0b6bc

  • SSDEEP

    6144:f5ADU35zeQ0R7+28O86sgg/QNpZmoZkdkCVLeC2wuJv8200XRRvD+S6GbEJXuh4X:xEa5zeD7+q/mIkdUvV0qRRL76zj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe
        "C:\Users\Admin\AppData\Local\Temp\9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Users\Admin\AppData\Local\Temp\9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe
          "C:\Users\Admin\AppData\Local\Temp\9a1e0ec6ca0fbf49384efdb8be759378841602e554ba0528df1de9f8693081eb.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:940
          • C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe
            "C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:540
            • C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe
              "C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1176
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp63930846.bat"
            4⤵
            • Deletes itself
            PID:1644
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1224
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1128
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-1822157377-614470190119780098-973487695469261956-12314532321411569134876411351"
          1⤵
            PID:1660

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp63930846.bat

            Filesize

            307B

            MD5

            b7ff024da133b6c093c4c57e3f7f688e

            SHA1

            4ad1af2c7a7067da5e8db48f98940669de69c606

            SHA256

            45bcf59d7ea394d837b861c71c0f6f8fbb8b1377bda07cbb3120a641ffbd8f81

            SHA512

            fb4339a8e73bbc5f563bddb48440410b607c712ddbfb9bbd203a324f03d148171c880bb9d4b4ba838d115c0f921372f1537d51ed8bc9194fbe4ddb0e9ca254b9

          • C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe

            Filesize

            322KB

            MD5

            24aa871a5a794473b774a71484905a7e

            SHA1

            41f7e8b8633cb9e95ace025a3f6abdc5c7b34437

            SHA256

            f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4

            SHA512

            042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f

          • C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe

            Filesize

            322KB

            MD5

            24aa871a5a794473b774a71484905a7e

            SHA1

            41f7e8b8633cb9e95ace025a3f6abdc5c7b34437

            SHA256

            f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4

            SHA512

            042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f

          • C:\Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe

            Filesize

            322KB

            MD5

            24aa871a5a794473b774a71484905a7e

            SHA1

            41f7e8b8633cb9e95ace025a3f6abdc5c7b34437

            SHA256

            f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4

            SHA512

            042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f

          • \Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe

            Filesize

            322KB

            MD5

            24aa871a5a794473b774a71484905a7e

            SHA1

            41f7e8b8633cb9e95ace025a3f6abdc5c7b34437

            SHA256

            f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4

            SHA512

            042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f

          • \Users\Admin\AppData\Roaming\Kyfeav\vyarvo.exe

            Filesize

            322KB

            MD5

            24aa871a5a794473b774a71484905a7e

            SHA1

            41f7e8b8633cb9e95ace025a3f6abdc5c7b34437

            SHA256

            f3f38947d122a100be84c03585cf1783e23227beaeed0cc3f95b094546ae09c4

            SHA512

            042fd929f731aca1e3a3b7fe95f717a4e369c8682d3817842eb54177425d565e7a02eb986bf5de45dfb9c47930c0a1038fd2b929ce4c642a5d39155688c3e34f

          • memory/540-84-0x0000000000400000-0x0000000000457000-memory.dmp

            Filesize

            348KB

          • memory/540-72-0x0000000000400000-0x0000000000457000-memory.dmp

            Filesize

            348KB

          • memory/940-59-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/940-65-0x00000000757E1000-0x00000000757E3000-memory.dmp

            Filesize

            8KB

          • memory/940-61-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/940-70-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/940-71-0x0000000000590000-0x00000000005E7000-memory.dmp

            Filesize

            348KB

          • memory/940-104-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/940-58-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/940-56-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/940-55-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1128-91-0x0000000001C80000-0x0000000001CCC000-memory.dmp

            Filesize

            304KB

          • memory/1128-90-0x0000000001C80000-0x0000000001CCC000-memory.dmp

            Filesize

            304KB

          • memory/1128-89-0x0000000001C80000-0x0000000001CCC000-memory.dmp

            Filesize

            304KB

          • memory/1128-88-0x0000000001C80000-0x0000000001CCC000-memory.dmp

            Filesize

            304KB

          • memory/1176-115-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/1224-95-0x0000000001B50000-0x0000000001B9C000-memory.dmp

            Filesize

            304KB

          • memory/1224-94-0x0000000001B50000-0x0000000001B9C000-memory.dmp

            Filesize

            304KB

          • memory/1224-96-0x0000000001B50000-0x0000000001B9C000-memory.dmp

            Filesize

            304KB

          • memory/1224-97-0x0000000001B50000-0x0000000001B9C000-memory.dmp

            Filesize

            304KB

          • memory/1276-101-0x00000000029B0000-0x00000000029FC000-memory.dmp

            Filesize

            304KB

          • memory/1276-103-0x00000000029B0000-0x00000000029FC000-memory.dmp

            Filesize

            304KB

          • memory/1276-105-0x00000000029B0000-0x00000000029FC000-memory.dmp

            Filesize

            304KB

          • memory/1276-100-0x00000000029B0000-0x00000000029FC000-memory.dmp

            Filesize

            304KB

          • memory/1644-111-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/1644-112-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/1644-110-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/1644-109-0x00000000000F0000-0x000000000013C000-memory.dmp

            Filesize

            304KB

          • memory/1888-54-0x0000000000400000-0x0000000000457000-memory.dmp

            Filesize

            348KB

          • memory/1888-63-0x0000000000400000-0x0000000000457000-memory.dmp

            Filesize

            348KB