Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 20:49
Behavioral task
behavioral1
Sample
96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe
Resource
win10v2004-20221111-en
General
-
Target
96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe
-
Size
307KB
-
MD5
4c460eee73242287483d95dba11b9aea
-
SHA1
8c92413171df477459d80021bb06d3c716d53bb9
-
SHA256
96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651
-
SHA512
adacdf17ffaeda0ef4fbfa941dae44cd45f251e9897e8b9e9e5fa39d8451792f9c9edfabaf9432cba343266a8775c088b3c7de9d063a40130c7275c0e1d19c7a
-
SSDEEP
6144:mTfz/T72Y0SCzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOYPECYeixlYGicA:mTrb7SStYsY1UMqMZJYSN7wbstOY8fvi
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
pid Process 1472 zucuef.exe -
Deletes itself 1 IoCs
pid Process 1368 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A87A45C8-3774-AD4D-8524-3978BFBA1A65} = "C:\\Users\\Admin\\AppData\\Roaming\\Sebuqy\\zucuef.exe" zucuef.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run zucuef.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1956 set thread context of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe 1472 zucuef.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1472 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 28 PID 1956 wrote to memory of 1472 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 28 PID 1956 wrote to memory of 1472 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 28 PID 1956 wrote to memory of 1472 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 28 PID 1472 wrote to memory of 1120 1472 zucuef.exe 17 PID 1472 wrote to memory of 1120 1472 zucuef.exe 17 PID 1472 wrote to memory of 1120 1472 zucuef.exe 17 PID 1472 wrote to memory of 1120 1472 zucuef.exe 17 PID 1472 wrote to memory of 1120 1472 zucuef.exe 17 PID 1472 wrote to memory of 1176 1472 zucuef.exe 16 PID 1472 wrote to memory of 1176 1472 zucuef.exe 16 PID 1472 wrote to memory of 1176 1472 zucuef.exe 16 PID 1472 wrote to memory of 1176 1472 zucuef.exe 16 PID 1472 wrote to memory of 1176 1472 zucuef.exe 16 PID 1472 wrote to memory of 1204 1472 zucuef.exe 15 PID 1472 wrote to memory of 1204 1472 zucuef.exe 15 PID 1472 wrote to memory of 1204 1472 zucuef.exe 15 PID 1472 wrote to memory of 1204 1472 zucuef.exe 15 PID 1472 wrote to memory of 1204 1472 zucuef.exe 15 PID 1472 wrote to memory of 1956 1472 zucuef.exe 18 PID 1472 wrote to memory of 1956 1472 zucuef.exe 18 PID 1472 wrote to memory of 1956 1472 zucuef.exe 18 PID 1472 wrote to memory of 1956 1472 zucuef.exe 18 PID 1472 wrote to memory of 1956 1472 zucuef.exe 18 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29 PID 1956 wrote to memory of 1368 1956 96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe"C:\Users\Admin\AppData\Local\Temp\96a14b9d739b4fd978c3149b5fe2a77143a66c0a0028870c72681848d8c34651.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Roaming\Sebuqy\zucuef.exe"C:\Users\Admin\AppData\Roaming\Sebuqy\zucuef.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpca9f0363.bat"3⤵
- Deletes itself
PID:1368
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466B
MD53207e19c24a839c9ccdc2369c98136f3
SHA1b5b441aa918cc7687bad971ee09ae1e49e394634
SHA256b0f43a22f4a00a72713c97405b056d9d9e2f1c8ca666b958fa434795fe6344a4
SHA5125e59e9e6c356229441b5b7af8058cc44d015c597ed383c7a0f28f97b789143fb70b1f13f6504d3ef904ebe061e74f24fe5ef74dc46f5ec2ca04d5245b36fc77b
-
Filesize
307B
MD5eb9680e48ca8fbb0de3c728035566fda
SHA16ef187992c24a6f80ab1a3a26752a8c002ba6f8e
SHA2563a27bdf2730769924db5ca52bf633769aba426034ff4c5d3c85f4df032688d90
SHA512a8c07e9cfdf20b0387df08532e73ad76c691bffb9e1fd5cda8dfc32a6c489b69b0e49006f524895a996d5a83c5b4faae41cd8877060014a838aab389345e8748
-
Filesize
307KB
MD5f6bfa373b896456ba08e5ac11ee8607a
SHA15cfe423c544356bb2ac0c8f0628e4dc5f0eb856b
SHA256eaff81e8cfac4fefbd26b5480a342153bd34da62dee40429655727e1541b5ced
SHA5120e2f3b42925d5086fcaa5d388bfdee2083e9848e6e49e4c1e8893421704fbe80a9be6bc948717d65c6cb39fd10fca441bbfc45be70a91c76c731a3b0ddbdb0a8
-
Filesize
307KB
MD5f6bfa373b896456ba08e5ac11ee8607a
SHA15cfe423c544356bb2ac0c8f0628e4dc5f0eb856b
SHA256eaff81e8cfac4fefbd26b5480a342153bd34da62dee40429655727e1541b5ced
SHA5120e2f3b42925d5086fcaa5d388bfdee2083e9848e6e49e4c1e8893421704fbe80a9be6bc948717d65c6cb39fd10fca441bbfc45be70a91c76c731a3b0ddbdb0a8
-
Filesize
307KB
MD5f6bfa373b896456ba08e5ac11ee8607a
SHA15cfe423c544356bb2ac0c8f0628e4dc5f0eb856b
SHA256eaff81e8cfac4fefbd26b5480a342153bd34da62dee40429655727e1541b5ced
SHA5120e2f3b42925d5086fcaa5d388bfdee2083e9848e6e49e4c1e8893421704fbe80a9be6bc948717d65c6cb39fd10fca441bbfc45be70a91c76c731a3b0ddbdb0a8