Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:32

General

  • Target

    248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe

  • Size

    426KB

  • MD5

    04a70c1e4bf0e18f5ac4f8744e091af4

  • SHA1

    f966dadc74fe920f0e0e3b5a8bf4e6748762fd43

  • SHA256

    248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62

  • SHA512

    0e3912c4d65fc597115f35119548446b414aaf96dbeea23df0be7aa9bb876f8d3198fc039dd03cfbeaac820027f6ce4b487df547baa2ce24b50237c9070f069f

  • SSDEEP

    6144:Z1DseJMObY5a94KniQOMth6N6aiZt9Z9ODyP3bpr:Z1jN39QTYainT9OD6Nr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1112
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1156
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1188
          • C:\Users\Admin\AppData\Local\Temp\248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe
            "C:\Users\Admin\AppData\Local\Temp\248a6afab849a9bd5149f0923bceed37c962264570a085017042f84305a6be62.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:1120
            • C:\Users\Admin\AppData\Roaming\Vuwe\ymyce.exe
              "C:\Users\Admin\AppData\Roaming\Vuwe\ymyce.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2036
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfaf106d4.bat"
              3⤵
              • Deletes itself
              PID:596

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpfaf106d4.bat

          Filesize

          307B

          MD5

          2b07679485e8c56388bb48bd61065a3d

          SHA1

          40e6a6c438736db25a570cc5ed534e82914c2c7e

          SHA256

          b59d0c573cc96cb1712e2b7c9cba23543835f86f08baec3a2089f6491456b26a

          SHA512

          83083207590184d9ee7606c1bd1545057d50e4bd7e382848c177b850dcb843d6e469bfea70bfe287865f4c2566140161577f33d5dd7fa53959fb93089bdc2a13

        • C:\Users\Admin\AppData\Roaming\Vuwe\ymyce.exe

          Filesize

          426KB

          MD5

          e54d2eae0f933079e7e758f5ca00cc00

          SHA1

          9170fa9f1e3d55c52baf8a84026f86add588aefe

          SHA256

          1704672f380fa4429e69ba25b17cf9aafdd9ddf2e39b1259ca8d9928ea33c499

          SHA512

          22b60150326d328ea8ae5649cd9e7296de9e3f440b840a1aab71135f6900a017939e74eee5f65035f0158b4852616a5957890dfadf65836c45c68b560dbb0385

        • C:\Users\Admin\AppData\Roaming\Vuwe\ymyce.exe

          Filesize

          426KB

          MD5

          e54d2eae0f933079e7e758f5ca00cc00

          SHA1

          9170fa9f1e3d55c52baf8a84026f86add588aefe

          SHA256

          1704672f380fa4429e69ba25b17cf9aafdd9ddf2e39b1259ca8d9928ea33c499

          SHA512

          22b60150326d328ea8ae5649cd9e7296de9e3f440b840a1aab71135f6900a017939e74eee5f65035f0158b4852616a5957890dfadf65836c45c68b560dbb0385

        • \Users\Admin\AppData\Roaming\Vuwe\ymyce.exe

          Filesize

          426KB

          MD5

          e54d2eae0f933079e7e758f5ca00cc00

          SHA1

          9170fa9f1e3d55c52baf8a84026f86add588aefe

          SHA256

          1704672f380fa4429e69ba25b17cf9aafdd9ddf2e39b1259ca8d9928ea33c499

          SHA512

          22b60150326d328ea8ae5649cd9e7296de9e3f440b840a1aab71135f6900a017939e74eee5f65035f0158b4852616a5957890dfadf65836c45c68b560dbb0385

        • memory/596-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/596-113-0x0000000000050000-0x0000000000096000-memory.dmp

          Filesize

          280KB

        • memory/596-99-0x0000000000050000-0x0000000000096000-memory.dmp

          Filesize

          280KB

        • memory/596-101-0x0000000000050000-0x0000000000096000-memory.dmp

          Filesize

          280KB

        • memory/596-100-0x0000000000050000-0x0000000000096000-memory.dmp

          Filesize

          280KB

        • memory/596-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/596-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/596-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/596-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/596-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/596-97-0x0000000000050000-0x0000000000096000-memory.dmp

          Filesize

          280KB

        • memory/1112-64-0x0000000001C80000-0x0000000001CC6000-memory.dmp

          Filesize

          280KB

        • memory/1112-65-0x0000000001C80000-0x0000000001CC6000-memory.dmp

          Filesize

          280KB

        • memory/1112-67-0x0000000001C80000-0x0000000001CC6000-memory.dmp

          Filesize

          280KB

        • memory/1112-66-0x0000000001C80000-0x0000000001CC6000-memory.dmp

          Filesize

          280KB

        • memory/1112-62-0x0000000001C80000-0x0000000001CC6000-memory.dmp

          Filesize

          280KB

        • memory/1120-86-0x0000000001E10000-0x0000000001E56000-memory.dmp

          Filesize

          280KB

        • memory/1120-75-0x00000000002D0000-0x0000000000316000-memory.dmp

          Filesize

          280KB

        • memory/1120-55-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/1120-54-0x0000000075291000-0x0000000075293000-memory.dmp

          Filesize

          8KB

        • memory/1120-88-0x0000000001E10000-0x0000000001E56000-memory.dmp

          Filesize

          280KB

        • memory/1120-87-0x0000000001E10000-0x0000000001E56000-memory.dmp

          Filesize

          280KB

        • memory/1120-89-0x0000000001E10000-0x0000000001E56000-memory.dmp

          Filesize

          280KB

        • memory/1120-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1120-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1120-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1120-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1120-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1120-56-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/1120-104-0x0000000001E10000-0x0000000001E56000-memory.dmp

          Filesize

          280KB

        • memory/1120-103-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/1120-77-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1156-73-0x00000000001D0000-0x0000000000216000-memory.dmp

          Filesize

          280KB

        • memory/1156-72-0x00000000001D0000-0x0000000000216000-memory.dmp

          Filesize

          280KB

        • memory/1156-71-0x00000000001D0000-0x0000000000216000-memory.dmp

          Filesize

          280KB

        • memory/1156-70-0x00000000001D0000-0x0000000000216000-memory.dmp

          Filesize

          280KB

        • memory/1188-78-0x0000000002AB0000-0x0000000002AF6000-memory.dmp

          Filesize

          280KB

        • memory/1188-82-0x0000000002AB0000-0x0000000002AF6000-memory.dmp

          Filesize

          280KB

        • memory/1188-80-0x0000000002AB0000-0x0000000002AF6000-memory.dmp

          Filesize

          280KB

        • memory/1188-83-0x0000000002AB0000-0x0000000002AF6000-memory.dmp

          Filesize

          280KB

        • memory/2036-79-0x00000000002A0000-0x00000000002E6000-memory.dmp

          Filesize

          280KB

        • memory/2036-81-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2036-114-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB