Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe
Resource
win10v2004-20221111-en
General
-
Target
ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe
-
Size
305KB
-
MD5
ca0661075011895266cbbe90bb7e97c3
-
SHA1
597103c85b2172e26034fbcc68902d79b639d873
-
SHA256
ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a
-
SHA512
783a93120093768123f9c1af5feab39ddee1c9a8cab1aeb56f223f6074aa062ec2add377b10939fd6194bc2fc764950e7d18fb2f5ac08432b6c57fb65fb2a33b
-
SSDEEP
6144:dG+2lnHHnHrLrLLrLrDipQTVT5KYD4l/3JKoPUGlnDJuG855+Hg1Wms7pSr1CES:dFbKKw4lhKMnND8IyWms7psCES
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 inec.exe -
Deletes itself 1 IoCs
pid Process 1592 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run inec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Inec = "C:\\Users\\Admin\\AppData\\Roaming\\Baic\\inec.exe" inec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1260 set thread context of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe 2028 inec.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2028 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 28 PID 1260 wrote to memory of 2028 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 28 PID 1260 wrote to memory of 2028 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 28 PID 1260 wrote to memory of 2028 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 28 PID 2028 wrote to memory of 1128 2028 inec.exe 19 PID 2028 wrote to memory of 1128 2028 inec.exe 19 PID 2028 wrote to memory of 1128 2028 inec.exe 19 PID 2028 wrote to memory of 1128 2028 inec.exe 19 PID 2028 wrote to memory of 1128 2028 inec.exe 19 PID 2028 wrote to memory of 1192 2028 inec.exe 18 PID 2028 wrote to memory of 1192 2028 inec.exe 18 PID 2028 wrote to memory of 1192 2028 inec.exe 18 PID 2028 wrote to memory of 1192 2028 inec.exe 18 PID 2028 wrote to memory of 1192 2028 inec.exe 18 PID 2028 wrote to memory of 1244 2028 inec.exe 16 PID 2028 wrote to memory of 1244 2028 inec.exe 16 PID 2028 wrote to memory of 1244 2028 inec.exe 16 PID 2028 wrote to memory of 1244 2028 inec.exe 16 PID 2028 wrote to memory of 1244 2028 inec.exe 16 PID 2028 wrote to memory of 1260 2028 inec.exe 17 PID 2028 wrote to memory of 1260 2028 inec.exe 17 PID 2028 wrote to memory of 1260 2028 inec.exe 17 PID 2028 wrote to memory of 1260 2028 inec.exe 17 PID 2028 wrote to memory of 1260 2028 inec.exe 17 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29 PID 1260 wrote to memory of 1592 1260 ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe"C:\Users\Admin\AppData\Local\Temp\ecf61cc6b25b3b3f7eeeb209c42eac8edc8b8e008485774dcb9c19c7c84b9d1a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Roaming\Baic\inec.exe"C:\Users\Admin\AppData\Roaming\Baic\inec.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\JGLFF93.bat"3⤵
- Deletes itself
PID:1592
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5267d84fcf324288596dce1736a108070
SHA1c077f8b46ad3d2e3741300c7801c546d64abdbe0
SHA256a6f32c09718efa40b1cd519dd3de2eedc58e4301ae14f454b706d1c1bf296553
SHA51230626dbf563930ef22d32b879a0999488535015456bedf4249fb2bd2f89d44fe5ad6bd582d28795279887df2fe61075672ca6a3572e2d2cf9b74cfbf31c80d3a
-
Filesize
305KB
MD519a5a805f07e38d5eb0639f446606695
SHA1de18161f8b0fc158ab9f5d336766862786c479dc
SHA256afd4dd9a07d9f20fef5063aa7300709bcdaef6adab6fee72b6ba5b52f9701288
SHA51204cf869441d4300eed7833b40c60271d8ed8087111e6ff0defd9180f364dc07273e0c75d1340e26c82d95535cc6b179046dd677ab94595b3a98186bf44a9a7c0
-
Filesize
305KB
MD519a5a805f07e38d5eb0639f446606695
SHA1de18161f8b0fc158ab9f5d336766862786c479dc
SHA256afd4dd9a07d9f20fef5063aa7300709bcdaef6adab6fee72b6ba5b52f9701288
SHA51204cf869441d4300eed7833b40c60271d8ed8087111e6ff0defd9180f364dc07273e0c75d1340e26c82d95535cc6b179046dd677ab94595b3a98186bf44a9a7c0
-
Filesize
305KB
MD519a5a805f07e38d5eb0639f446606695
SHA1de18161f8b0fc158ab9f5d336766862786c479dc
SHA256afd4dd9a07d9f20fef5063aa7300709bcdaef6adab6fee72b6ba5b52f9701288
SHA51204cf869441d4300eed7833b40c60271d8ed8087111e6ff0defd9180f364dc07273e0c75d1340e26c82d95535cc6b179046dd677ab94595b3a98186bf44a9a7c0
-
Filesize
305KB
MD519a5a805f07e38d5eb0639f446606695
SHA1de18161f8b0fc158ab9f5d336766862786c479dc
SHA256afd4dd9a07d9f20fef5063aa7300709bcdaef6adab6fee72b6ba5b52f9701288
SHA51204cf869441d4300eed7833b40c60271d8ed8087111e6ff0defd9180f364dc07273e0c75d1340e26c82d95535cc6b179046dd677ab94595b3a98186bf44a9a7c0