Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe
Resource
win10v2004-20221111-en
General
-
Target
0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe
-
Size
4.5MB
-
MD5
0e64e281c8c4c6811872efd5f6eee68a
-
SHA1
9e710d40a0e189cb1817278ee29a76e37183b13d
-
SHA256
0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb
-
SHA512
8d27b4be65cef5dca80cfc6cf17b334efc7d930488f3385d8c12d40fa87a51644819b36b8af80deea08c634cc22c7d672300b135abae6aeda70f06abece192fc
-
SSDEEP
98304:YjX2TR/+9g+1wLgJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk84p1bFmL1OVYIl:V1+vJiPD3Nm7AJEgLYX8CNYzQEr0WO0Z
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\DYEEFZUH\hosts 0be0502abCRBP.exe -
Executes dropped EXE 1 IoCs
pid Process 988 0be0502abCRBP.exe -
Loads dropped DLL 2 IoCs
pid Process 1768 0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe 1768 0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 692 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 988 0be0502abCRBP.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 988 0be0502abCRBP.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1768 wrote to memory of 988 1768 0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe 27 PID 1768 wrote to memory of 988 1768 0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe 27 PID 1768 wrote to memory of 988 1768 0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe 27 PID 1768 wrote to memory of 988 1768 0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe 27 PID 988 wrote to memory of 1616 988 0be0502abCRBP.exe 28 PID 988 wrote to memory of 1616 988 0be0502abCRBP.exe 28 PID 988 wrote to memory of 1616 988 0be0502abCRBP.exe 28 PID 988 wrote to memory of 1616 988 0be0502abCRBP.exe 28 PID 1616 wrote to memory of 692 1616 cmd.exe 30 PID 1616 wrote to memory of 692 1616 cmd.exe 30 PID 1616 wrote to memory of 692 1616 cmd.exe 30 PID 1616 wrote to memory of 692 1616 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe"C:\Users\Admin\AppData\Local\Temp\0be0502ab5b10f04a669b3f58f3f9cf468306102521201802ac2ffbfe4b55abb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\0be0502abCRBP.exe-yue2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
PID:692
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD52039bf5c78d3cd9d7b45b4215c294306
SHA1acf25f72c7b39cacb68eab28ffe969180f7908d3
SHA25644546bd620886e5db5ddac277a637e66763b8a8261161aac599195b3c88d0523
SHA5120b02b615334b8065cbe521dbe6612c7aba8cb1a42630fcece985e24107e6e658e6ea9172cb10aec62afbaa5914deff6e08ac8392f6f1becf1a3607ee867162b5
-
Filesize
4.5MB
MD52039bf5c78d3cd9d7b45b4215c294306
SHA1acf25f72c7b39cacb68eab28ffe969180f7908d3
SHA25644546bd620886e5db5ddac277a637e66763b8a8261161aac599195b3c88d0523
SHA5120b02b615334b8065cbe521dbe6612c7aba8cb1a42630fcece985e24107e6e658e6ea9172cb10aec62afbaa5914deff6e08ac8392f6f1becf1a3607ee867162b5
-
Filesize
4.5MB
MD52039bf5c78d3cd9d7b45b4215c294306
SHA1acf25f72c7b39cacb68eab28ffe969180f7908d3
SHA25644546bd620886e5db5ddac277a637e66763b8a8261161aac599195b3c88d0523
SHA5120b02b615334b8065cbe521dbe6612c7aba8cb1a42630fcece985e24107e6e658e6ea9172cb10aec62afbaa5914deff6e08ac8392f6f1becf1a3607ee867162b5