Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe
Resource
win10v2004-20221111-en
General
-
Target
74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe
-
Size
322KB
-
MD5
6c78a972994cc61b642f870ff9239c28
-
SHA1
67e15a2e9084165b5dee5d3a31abb35a01d6a3ce
-
SHA256
74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f
-
SHA512
4ce2e245a9388d6dab824874edc61a6fa8d2b6758b26810d6b1852fb71ed4109a99d8b530cd3dfb5db83eaccdda9bf80c5e344203f9d3649b6ef22ee6ce6539c
-
SSDEEP
6144:VJgJqLRdtwj7Cx9CfmXyKN3Or7PigcAkfTGHsOE9G/2yEuaIrouctmz:3SyRw+9CfmXyKBOXYAwTXO0zuaIrour
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1896 anfu.exe 2000 anfu.exe -
Deletes itself 1 IoCs
pid Process 1084 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run anfu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Ytyxaw\\anfu.exe" anfu.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 900 set thread context of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 1896 set thread context of 2000 1896 anfu.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe 2000 anfu.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 900 wrote to memory of 780 900 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 27 PID 780 wrote to memory of 1896 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 28 PID 780 wrote to memory of 1896 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 28 PID 780 wrote to memory of 1896 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 28 PID 780 wrote to memory of 1896 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 28 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 1896 wrote to memory of 2000 1896 anfu.exe 29 PID 2000 wrote to memory of 1260 2000 anfu.exe 16 PID 2000 wrote to memory of 1260 2000 anfu.exe 16 PID 780 wrote to memory of 1084 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 30 PID 780 wrote to memory of 1084 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 30 PID 780 wrote to memory of 1084 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 30 PID 780 wrote to memory of 1084 780 74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe 30 PID 2000 wrote to memory of 1260 2000 anfu.exe 16 PID 2000 wrote to memory of 1260 2000 anfu.exe 16 PID 2000 wrote to memory of 1260 2000 anfu.exe 16 PID 2000 wrote to memory of 1364 2000 anfu.exe 15 PID 2000 wrote to memory of 1364 2000 anfu.exe 15 PID 2000 wrote to memory of 1364 2000 anfu.exe 15 PID 2000 wrote to memory of 1364 2000 anfu.exe 15 PID 2000 wrote to memory of 1364 2000 anfu.exe 15 PID 2000 wrote to memory of 1420 2000 anfu.exe 14 PID 2000 wrote to memory of 1420 2000 anfu.exe 14 PID 2000 wrote to memory of 1420 2000 anfu.exe 14 PID 2000 wrote to memory of 1420 2000 anfu.exe 14 PID 2000 wrote to memory of 1420 2000 anfu.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe"C:\Users\Admin\AppData\Local\Temp\74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe"C:\Users\Admin\AppData\Local\Temp\74ee5c3d4522602d2537d902875d706cda37fdfc41b53a4e20e494d5b3f6504f.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Roaming\Ytyxaw\anfu.exe"C:\Users\Admin\AppData\Roaming\Ytyxaw\anfu.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Roaming\Ytyxaw\anfu.exe"C:\Users\Admin\AppData\Roaming\Ytyxaw\anfu.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9061a2b3.bat"4⤵
- Deletes itself
PID:1084
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1364
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD546873716f7a6a1694d278de6be8aaec5
SHA18b6754a3b887e0a90d4e75754268797dceef8fd1
SHA2564d1d6b6f6f2a6be672e38e69a4777296924e15909bbcac277d28b917a1f28cf8
SHA5126ecb1e76631a0eeed57f8666c5f0fdec4674c4ce91ee7751cd8b5ab5796b9e33db93d4a6035c14b63a41386c7a5c85879de0eca03e9becf318f1dfcc158f111a
-
Filesize
322KB
MD50b989401554ab5828a5e368b5e247060
SHA17bab84c0cd8122b94bc9ac65bfaf5706cd5e9273
SHA2560c9546bba68c653655924b9c38f29d17d018a2d43b54ae1bb92c04773fd0e42a
SHA51238671cda43f3712785c1e00e8a7a5ba1d6f0542754d1cf24e3647d29dd668af0e7ad3ddba107e829cc003eee8edc54c9397eb72969857958d889fb539f26d8e7
-
Filesize
322KB
MD50b989401554ab5828a5e368b5e247060
SHA17bab84c0cd8122b94bc9ac65bfaf5706cd5e9273
SHA2560c9546bba68c653655924b9c38f29d17d018a2d43b54ae1bb92c04773fd0e42a
SHA51238671cda43f3712785c1e00e8a7a5ba1d6f0542754d1cf24e3647d29dd668af0e7ad3ddba107e829cc003eee8edc54c9397eb72969857958d889fb539f26d8e7
-
Filesize
322KB
MD50b989401554ab5828a5e368b5e247060
SHA17bab84c0cd8122b94bc9ac65bfaf5706cd5e9273
SHA2560c9546bba68c653655924b9c38f29d17d018a2d43b54ae1bb92c04773fd0e42a
SHA51238671cda43f3712785c1e00e8a7a5ba1d6f0542754d1cf24e3647d29dd668af0e7ad3ddba107e829cc003eee8edc54c9397eb72969857958d889fb539f26d8e7
-
Filesize
322KB
MD50b989401554ab5828a5e368b5e247060
SHA17bab84c0cd8122b94bc9ac65bfaf5706cd5e9273
SHA2560c9546bba68c653655924b9c38f29d17d018a2d43b54ae1bb92c04773fd0e42a
SHA51238671cda43f3712785c1e00e8a7a5ba1d6f0542754d1cf24e3647d29dd668af0e7ad3ddba107e829cc003eee8edc54c9397eb72969857958d889fb539f26d8e7
-
Filesize
322KB
MD50b989401554ab5828a5e368b5e247060
SHA17bab84c0cd8122b94bc9ac65bfaf5706cd5e9273
SHA2560c9546bba68c653655924b9c38f29d17d018a2d43b54ae1bb92c04773fd0e42a
SHA51238671cda43f3712785c1e00e8a7a5ba1d6f0542754d1cf24e3647d29dd668af0e7ad3ddba107e829cc003eee8edc54c9397eb72969857958d889fb539f26d8e7