Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe
Resource
win10v2004-20221111-en
General
-
Target
248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe
-
Size
426KB
-
MD5
04a70c1e4bf0e18f5ac4f8744e091af4
-
SHA1
f966dadc74fe920f0e0e3b5a8bf4e6748762fd43
-
SHA256
248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62
-
SHA512
0e3912c4d65fc597115f35119548446b414aaf96dbeea23df0be7aa9bb876f8d3198fc039dd03cfbeaac820027f6ce4b487df547baa2ce24b50237c9070f069f
-
SSDEEP
6144:Z1DseJMObY5a94KniQOMth6N6aiZt9Z9ODyP3bpr:Z1jN39QTYainT9OD6Nr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 ymyce.exe -
Deletes itself 1 IoCs
pid Process 596 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run ymyce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A87A45C8-3774-AD4D-8524-3978BFBA1A65} = "C:\\Users\\Admin\\AppData\\Roaming\\Vuwe\\ymyce.exe" ymyce.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1120 set thread context of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe 2036 ymyce.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 2036 ymyce.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2036 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 28 PID 1120 wrote to memory of 2036 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 28 PID 1120 wrote to memory of 2036 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 28 PID 1120 wrote to memory of 2036 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 28 PID 2036 wrote to memory of 1112 2036 ymyce.exe 18 PID 2036 wrote to memory of 1112 2036 ymyce.exe 18 PID 2036 wrote to memory of 1112 2036 ymyce.exe 18 PID 2036 wrote to memory of 1112 2036 ymyce.exe 18 PID 2036 wrote to memory of 1112 2036 ymyce.exe 18 PID 2036 wrote to memory of 1156 2036 ymyce.exe 19 PID 2036 wrote to memory of 1156 2036 ymyce.exe 19 PID 2036 wrote to memory of 1156 2036 ymyce.exe 19 PID 2036 wrote to memory of 1156 2036 ymyce.exe 19 PID 2036 wrote to memory of 1156 2036 ymyce.exe 19 PID 2036 wrote to memory of 1188 2036 ymyce.exe 20 PID 2036 wrote to memory of 1188 2036 ymyce.exe 20 PID 2036 wrote to memory of 1188 2036 ymyce.exe 20 PID 2036 wrote to memory of 1188 2036 ymyce.exe 20 PID 2036 wrote to memory of 1188 2036 ymyce.exe 20 PID 2036 wrote to memory of 1120 2036 ymyce.exe 27 PID 2036 wrote to memory of 1120 2036 ymyce.exe 27 PID 2036 wrote to memory of 1120 2036 ymyce.exe 27 PID 2036 wrote to memory of 1120 2036 ymyce.exe 27 PID 2036 wrote to memory of 1120 2036 ymyce.exe 27 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29 PID 1120 wrote to memory of 596 1120 248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe"C:\Users\Admin\AppData\Local\Temp\248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\Vuwe\ymyce.exe"C:\Users\Admin\AppData\Roaming\Vuwe\ymyce.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfaf106d4.bat"3⤵
- Deletes itself
PID:596
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD52b07679485e8c56388bb48bd61065a3d
SHA140e6a6c438736db25a570cc5ed534e82914c2c7e
SHA256b59d0c573cc96cb1712e2b7c9cba23543835f86f08baec3a2089f6491456b26a
SHA51283083207590184d9ee7606c1bd1545057d50e4bd7e382848c177b850dcb843d6e469bfea70bfe287865f4c2566140161577f33d5dd7fa53959fb93089bdc2a13
-
Filesize
426KB
MD5e54d2eae0f933079e7e758f5ca00cc00
SHA19170fa9f1e3d55c52baf8a84026f86add588aefe
SHA2561704672f380fa4429e69ba25b17cf9aafdd9ddf2e39b1259ca8d9928ea33c499
SHA51222b60150326d328ea8ae5649cd9e7296de9e3f440b840a1aab71135f6900a017939e74eee5f65035f0158b4852616a5957890dfadf65836c45c68b560dbb0385
-
Filesize
426KB
MD5e54d2eae0f933079e7e758f5ca00cc00
SHA19170fa9f1e3d55c52baf8a84026f86add588aefe
SHA2561704672f380fa4429e69ba25b17cf9aafdd9ddf2e39b1259ca8d9928ea33c499
SHA51222b60150326d328ea8ae5649cd9e7296de9e3f440b840a1aab71135f6900a017939e74eee5f65035f0158b4852616a5957890dfadf65836c45c68b560dbb0385
-
Filesize
426KB
MD5e54d2eae0f933079e7e758f5ca00cc00
SHA19170fa9f1e3d55c52baf8a84026f86add588aefe
SHA2561704672f380fa4429e69ba25b17cf9aafdd9ddf2e39b1259ca8d9928ea33c499
SHA51222b60150326d328ea8ae5649cd9e7296de9e3f440b840a1aab71135f6900a017939e74eee5f65035f0158b4852616a5957890dfadf65836c45c68b560dbb0385