Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe
Resource
win10v2004-20221111-en
General
-
Target
95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe
-
Size
315KB
-
MD5
f2bb617b2457edbd97e4b721b3886561
-
SHA1
d4022332cbae44df2112f90e35e8d8c43cfc77bf
-
SHA256
95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27
-
SHA512
232a37b14c1d6d1d576c95bdeade91d92b7490eadc2a098d6a474295fd36c20b9ed383be6f717a11246a58a4c9195dffc5015790c60d074738218b90e4e4f9d0
-
SSDEEP
6144:ODxcTponzQPSqzXXaydn3nozW5TFYkI4uLZMGLv+xxxxxxxxxxxxxxxxngxxxxxg:KeTGzQPRHHdn34y3IbnLGxxxxxxxxxxr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1132 okal.exe -
Deletes itself 1 IoCs
pid Process 452 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run okal.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Oxriva\\okal.exe" okal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1112 set thread context of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe 1132 okal.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 1132 okal.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1132 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 26 PID 1112 wrote to memory of 1132 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 26 PID 1112 wrote to memory of 1132 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 26 PID 1112 wrote to memory of 1132 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 26 PID 1132 wrote to memory of 1300 1132 okal.exe 11 PID 1132 wrote to memory of 1300 1132 okal.exe 11 PID 1132 wrote to memory of 1300 1132 okal.exe 11 PID 1132 wrote to memory of 1300 1132 okal.exe 11 PID 1132 wrote to memory of 1300 1132 okal.exe 11 PID 1132 wrote to memory of 1404 1132 okal.exe 17 PID 1132 wrote to memory of 1404 1132 okal.exe 17 PID 1132 wrote to memory of 1404 1132 okal.exe 17 PID 1132 wrote to memory of 1404 1132 okal.exe 17 PID 1132 wrote to memory of 1404 1132 okal.exe 17 PID 1132 wrote to memory of 1444 1132 okal.exe 12 PID 1132 wrote to memory of 1444 1132 okal.exe 12 PID 1132 wrote to memory of 1444 1132 okal.exe 12 PID 1132 wrote to memory of 1444 1132 okal.exe 12 PID 1132 wrote to memory of 1444 1132 okal.exe 12 PID 1132 wrote to memory of 1112 1132 okal.exe 25 PID 1132 wrote to memory of 1112 1132 okal.exe 25 PID 1132 wrote to memory of 1112 1132 okal.exe 25 PID 1132 wrote to memory of 1112 1132 okal.exe 25 PID 1132 wrote to memory of 1112 1132 okal.exe 25 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27 PID 1112 wrote to memory of 452 1112 95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1300
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe"C:\Users\Admin\AppData\Local\Temp\95e987d876d1729a913253a06951b6ecc06f376db62b529a19c273232a4afe27.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Roaming\Oxriva\okal.exe"C:\Users\Admin\AppData\Roaming\Oxriva\okal.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmped677dd2.bat"3⤵
- Deletes itself
PID:452
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD53ceaa9d68a3f3d89d304e3e109e03599
SHA1a4bd3ff3040089880b70f2d1de4056f9c5de71ad
SHA2564ce8ab60ff63134f1ad0c908631ac08b986a20209de0435af7dd55ccc0eec221
SHA512026b3ffa8938633e58867f33a0568814caa487abbc0d58e0311d6b68b54fa8ab1ede105a2c4bbcce858b7f66cc3935b3ba7812598515a50f4c11a2f7da71337b
-
Filesize
315KB
MD5e50b4187c45475c030287b0fda1e70d9
SHA1e1e333111d6184c508bb78cd1dbfa62f06951846
SHA256116c95f5765206d43c7ff65c58d3543d5abf70e483208a6e7fb24840d9928eb2
SHA5122447f1f21b9404a1d5b4ea20046a8a2a7555e9d31fe7c3e3b7ff6d868bb28d405ce5a67f3f2fb676f403c770b3d68dec1d97ad39f435b241b2c2fc5898ee5c86
-
Filesize
315KB
MD5e50b4187c45475c030287b0fda1e70d9
SHA1e1e333111d6184c508bb78cd1dbfa62f06951846
SHA256116c95f5765206d43c7ff65c58d3543d5abf70e483208a6e7fb24840d9928eb2
SHA5122447f1f21b9404a1d5b4ea20046a8a2a7555e9d31fe7c3e3b7ff6d868bb28d405ce5a67f3f2fb676f403c770b3d68dec1d97ad39f435b241b2c2fc5898ee5c86
-
Filesize
315KB
MD5e50b4187c45475c030287b0fda1e70d9
SHA1e1e333111d6184c508bb78cd1dbfa62f06951846
SHA256116c95f5765206d43c7ff65c58d3543d5abf70e483208a6e7fb24840d9928eb2
SHA5122447f1f21b9404a1d5b4ea20046a8a2a7555e9d31fe7c3e3b7ff6d868bb28d405ce5a67f3f2fb676f403c770b3d68dec1d97ad39f435b241b2c2fc5898ee5c86
-
Filesize
315KB
MD5e50b4187c45475c030287b0fda1e70d9
SHA1e1e333111d6184c508bb78cd1dbfa62f06951846
SHA256116c95f5765206d43c7ff65c58d3543d5abf70e483208a6e7fb24840d9928eb2
SHA5122447f1f21b9404a1d5b4ea20046a8a2a7555e9d31fe7c3e3b7ff6d868bb28d405ce5a67f3f2fb676f403c770b3d68dec1d97ad39f435b241b2c2fc5898ee5c86