Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
233s -
max time network
312s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 23:34
Behavioral task
behavioral1
Sample
a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe
Resource
win10v2004-20220812-en
General
-
Target
a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe
-
Size
6KB
-
MD5
8b3525a7abe5d1a226730c4aeb73526c
-
SHA1
e5f375e318eef59fff41ddeca99c3897fb05544e
-
SHA256
a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528
-
SHA512
82a7de5239de78573037099a1135bc81d5fe0d3b1800c81fae0ba4bb5b88a0f95f0bd23f04d40135ffee4806031fbce9e0a1173dd80632c8d49f3742cd99b210
-
SSDEEP
96:8ZKmoW3LVeBHQGn6SZUqTNms7s8PFsBVWJpbBHa0roOQL2ADnYQghbI4:8s2bwHQibcsQEhfFa0rML/Ahc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system\\conime.exe" a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 conime.exe -
resource yara_rule behavioral1/memory/1164-55-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x000b0000000122f1-57.dat upx behavioral1/files/0x000b0000000122f1-60.dat upx behavioral1/files/0x000b0000000122f1-58.dat upx behavioral1/memory/1772-63-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 520 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\conime.exe a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe File created C:\Windows\system\conime.exe a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe 1772 conime.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1772 conime.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1164 wrote to memory of 520 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 28 PID 1164 wrote to memory of 520 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 28 PID 1164 wrote to memory of 520 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 28 PID 1164 wrote to memory of 520 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 28 PID 1164 wrote to memory of 1772 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 30 PID 1164 wrote to memory of 1772 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 30 PID 1164 wrote to memory of 1772 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 30 PID 1164 wrote to memory of 1772 1164 a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe"C:\Users\Admin\AppData\Local\Temp\a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\cmd.execmd /c c:\test.bat2⤵
- Deletes itself
PID:520
-
-
C:\Windows\system\conime.exe"C:\Windows\system\conime.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD58b3525a7abe5d1a226730c4aeb73526c
SHA1e5f375e318eef59fff41ddeca99c3897fb05544e
SHA256a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528
SHA51282a7de5239de78573037099a1135bc81d5fe0d3b1800c81fae0ba4bb5b88a0f95f0bd23f04d40135ffee4806031fbce9e0a1173dd80632c8d49f3742cd99b210
-
Filesize
249B
MD5d64e0fcf3736cd91c9240d168c43d9a6
SHA1ec499509d39e246354092d728bc9ecd981d1bbd5
SHA256f322146ebfffab7d257c38e3ef5768cf859ac592bfa9229ad9de0a698f877a59
SHA512ecdf2f7c2e5a8840c8db1a8840803daa472412c488d5cbfb8e93bf7be5fcfed59a53d37b61aa8c65ff301c89715e4f61d19f964ef47cadf8e677f1d1de3cd8b4
-
Filesize
6KB
MD58b3525a7abe5d1a226730c4aeb73526c
SHA1e5f375e318eef59fff41ddeca99c3897fb05544e
SHA256a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528
SHA51282a7de5239de78573037099a1135bc81d5fe0d3b1800c81fae0ba4bb5b88a0f95f0bd23f04d40135ffee4806031fbce9e0a1173dd80632c8d49f3742cd99b210
-
Filesize
6KB
MD58b3525a7abe5d1a226730c4aeb73526c
SHA1e5f375e318eef59fff41ddeca99c3897fb05544e
SHA256a3282d2d782635c0a83c86b082dbdff29ac24f3c9e5d6e80e3f2c0e76bcdc528
SHA51282a7de5239de78573037099a1135bc81d5fe0d3b1800c81fae0ba4bb5b88a0f95f0bd23f04d40135ffee4806031fbce9e0a1173dd80632c8d49f3742cd99b210