Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 16:21

General

  • Target

    ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe

  • Size

    305KB

  • MD5

    ca0661075011895266cbbe90bb7e97c3

  • SHA1

    597103c85b2172e26034fbcc68902d79b639d873

  • SHA256

    ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a

  • SHA512

    783a93120093768123f9c1af5feab39ddee1c9a8cab1aeb56f223f6074aa062ec2add377b10939fd6194bc2fc764950e7d18fb2f5ac08432b6c57fb65fb2a33b

  • SSDEEP

    6144:dG+2lnHHnHrLrLLrLrDipQTVT5KYD4l/3JKoPUGlnDJuG855+Hg1Wms7pSr1CES:dFbKKw4lhKMnND8IyWms7psCES

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe
        "C:\Users\Admin\AppData\Local\Temp\ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1260
        • C:\Users\Admin\AppData\Roaming\Baic\inec.exe
          "C:\Users\Admin\AppData\Roaming\Baic\inec.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2028
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\JGLFF93.bat"
          3⤵
          • Deletes itself
          PID:1592
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1192
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1128

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\JGLFF93.bat

          Filesize

          303B

          MD5

          267d84fcf324288596dce1736a108070

          SHA1

          c077f8b46ad3d2e3741300c7801c546d64abdbe0

          SHA256

          a6f32c09718efa40b1cd519dd3de2eedc58e4301ae14f454b706d1c1bf296553

          SHA512

          30626dbf563930ef22d32b879a0999488535015456bedf4249fb2bd2f89d44fe5ad6bd582d28795279887df2fe61075672ca6a3572e2d2cf9b74cfbf31c80d3a

        • C:\Users\Admin\AppData\Roaming\Baic\inec.exe

          Filesize

          305KB

          MD5

          19a5a805f07e38d5eb0639f446606695

          SHA1

          de18161f8b0fc158ab9f5d336766862786c479dc

          SHA256

          afd4dd9a07d9f20fef5063aa7300709bcdaef6adab6fee72b6ba5b52f9701288

          SHA512

          04cf869441d4300eed7833b40c60271d8ed8087111e6ff0defd9180f364dc07273e0c75d1340e26c82d95535cc6b179046dd677ab94595b3a98186bf44a9a7c0

        • C:\Users\Admin\AppData\Roaming\Baic\inec.exe

          Filesize

          305KB

          MD5

          19a5a805f07e38d5eb0639f446606695

          SHA1

          de18161f8b0fc158ab9f5d336766862786c479dc

          SHA256

          afd4dd9a07d9f20fef5063aa7300709bcdaef6adab6fee72b6ba5b52f9701288

          SHA512

          04cf869441d4300eed7833b40c60271d8ed8087111e6ff0defd9180f364dc07273e0c75d1340e26c82d95535cc6b179046dd677ab94595b3a98186bf44a9a7c0

        • \Users\Admin\AppData\Roaming\Baic\inec.exe

          Filesize

          305KB

          MD5

          19a5a805f07e38d5eb0639f446606695

          SHA1

          de18161f8b0fc158ab9f5d336766862786c479dc

          SHA256

          afd4dd9a07d9f20fef5063aa7300709bcdaef6adab6fee72b6ba5b52f9701288

          SHA512

          04cf869441d4300eed7833b40c60271d8ed8087111e6ff0defd9180f364dc07273e0c75d1340e26c82d95535cc6b179046dd677ab94595b3a98186bf44a9a7c0

        • \Users\Admin\AppData\Roaming\Baic\inec.exe

          Filesize

          305KB

          MD5

          19a5a805f07e38d5eb0639f446606695

          SHA1

          de18161f8b0fc158ab9f5d336766862786c479dc

          SHA256

          afd4dd9a07d9f20fef5063aa7300709bcdaef6adab6fee72b6ba5b52f9701288

          SHA512

          04cf869441d4300eed7833b40c60271d8ed8087111e6ff0defd9180f364dc07273e0c75d1340e26c82d95535cc6b179046dd677ab94595b3a98186bf44a9a7c0

        • memory/1128-65-0x0000000001E70000-0x0000000001EB9000-memory.dmp

          Filesize

          292KB

        • memory/1128-67-0x0000000001E70000-0x0000000001EB9000-memory.dmp

          Filesize

          292KB

        • memory/1128-68-0x0000000001E70000-0x0000000001EB9000-memory.dmp

          Filesize

          292KB

        • memory/1128-69-0x0000000001E70000-0x0000000001EB9000-memory.dmp

          Filesize

          292KB

        • memory/1128-70-0x0000000001E70000-0x0000000001EB9000-memory.dmp

          Filesize

          292KB

        • memory/1192-75-0x0000000001C50000-0x0000000001C99000-memory.dmp

          Filesize

          292KB

        • memory/1192-73-0x0000000001C50000-0x0000000001C99000-memory.dmp

          Filesize

          292KB

        • memory/1192-76-0x0000000001C50000-0x0000000001C99000-memory.dmp

          Filesize

          292KB

        • memory/1192-74-0x0000000001C50000-0x0000000001C99000-memory.dmp

          Filesize

          292KB

        • memory/1244-81-0x0000000002610000-0x0000000002659000-memory.dmp

          Filesize

          292KB

        • memory/1244-80-0x0000000002610000-0x0000000002659000-memory.dmp

          Filesize

          292KB

        • memory/1244-79-0x0000000002610000-0x0000000002659000-memory.dmp

          Filesize

          292KB

        • memory/1244-82-0x0000000002610000-0x0000000002659000-memory.dmp

          Filesize

          292KB

        • memory/1260-85-0x0000000000490000-0x00000000004D9000-memory.dmp

          Filesize

          292KB

        • memory/1260-102-0x0000000000490000-0x00000000004D9000-memory.dmp

          Filesize

          292KB

        • memory/1260-55-0x0000000000401000-0x0000000000442000-memory.dmp

          Filesize

          260KB

        • memory/1260-56-0x0000000075C41000-0x0000000075C43000-memory.dmp

          Filesize

          8KB

        • memory/1260-54-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/1260-86-0x0000000000490000-0x00000000004D9000-memory.dmp

          Filesize

          292KB

        • memory/1260-87-0x0000000000490000-0x00000000004D9000-memory.dmp

          Filesize

          292KB

        • memory/1260-88-0x0000000000490000-0x00000000004D9000-memory.dmp

          Filesize

          292KB

        • memory/1260-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1260-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1260-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1260-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1260-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1260-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1592-99-0x00000000000C0000-0x0000000000109000-memory.dmp

          Filesize

          292KB

        • memory/1592-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1592-100-0x00000000000C0000-0x0000000000109000-memory.dmp

          Filesize

          292KB

        • memory/1592-101-0x00000000000C0000-0x0000000000109000-memory.dmp

          Filesize

          292KB

        • memory/1592-97-0x00000000000C0000-0x0000000000109000-memory.dmp

          Filesize

          292KB

        • memory/1592-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1592-113-0x00000000000C0000-0x0000000000109000-memory.dmp

          Filesize

          292KB

        • memory/1592-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1592-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1592-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1592-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1592-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/2028-62-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB