Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe
Resource
win10v2004-20220812-en
General
-
Target
ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe
-
Size
420KB
-
MD5
96753f510be9b8d3ef3ce5cdb749cde2
-
SHA1
eb346a2dd1925717f94edb53ba8ab0cdb19747fb
-
SHA256
ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6
-
SHA512
24837bca3a8153aba65ea9def178d01e5ca684146c96c6bac80a6ce7d2f787efaa2ff94ffcdd75839e747a9ebe5723e91b0ec717315266500c214788780f6ccf
-
SSDEEP
6144:n4pPAtXzbCtWiViuXxXRqqY8k8uzAKUVjO8d+qVMjcwPnYyxwiwFwgwsv:4BAtE+kvBKZ8d+qVwTfYxv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2040 qivi.exe -
Deletes itself 1 IoCs
pid Process 1652 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Ikinmy\\qivi.exe" qivi.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run qivi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe 2040 qivi.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 2040 qivi.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2040 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 28 PID 1624 wrote to memory of 2040 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 28 PID 1624 wrote to memory of 2040 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 28 PID 1624 wrote to memory of 2040 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 28 PID 2040 wrote to memory of 1124 2040 qivi.exe 18 PID 2040 wrote to memory of 1124 2040 qivi.exe 18 PID 2040 wrote to memory of 1124 2040 qivi.exe 18 PID 2040 wrote to memory of 1124 2040 qivi.exe 18 PID 2040 wrote to memory of 1124 2040 qivi.exe 18 PID 2040 wrote to memory of 1176 2040 qivi.exe 17 PID 2040 wrote to memory of 1176 2040 qivi.exe 17 PID 2040 wrote to memory of 1176 2040 qivi.exe 17 PID 2040 wrote to memory of 1176 2040 qivi.exe 17 PID 2040 wrote to memory of 1176 2040 qivi.exe 17 PID 2040 wrote to memory of 1220 2040 qivi.exe 16 PID 2040 wrote to memory of 1220 2040 qivi.exe 16 PID 2040 wrote to memory of 1220 2040 qivi.exe 16 PID 2040 wrote to memory of 1220 2040 qivi.exe 16 PID 2040 wrote to memory of 1220 2040 qivi.exe 16 PID 2040 wrote to memory of 1624 2040 qivi.exe 15 PID 2040 wrote to memory of 1624 2040 qivi.exe 15 PID 2040 wrote to memory of 1624 2040 qivi.exe 15 PID 2040 wrote to memory of 1624 2040 qivi.exe 15 PID 2040 wrote to memory of 1624 2040 qivi.exe 15 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29 PID 1624 wrote to memory of 1652 1624 ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe"C:\Users\Admin\AppData\Local\Temp\ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\Ikinmy\qivi.exe"C:\Users\Admin\AppData\Roaming\Ikinmy\qivi.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpbbf9c9c5.bat"2⤵
- Deletes itself
PID:1652
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD597bd6cf792881bbb362f6735fac5dc36
SHA1078cc6d2687f22827544669715234bb40e3afef2
SHA2565f8b656fbd2dfcadfb8d93142e8a5418995bdbdeaff76dfced6f519ee8890ae9
SHA51240b475eb10f0e273eec567ffeac22a8620d50eac0cd6d563245486c8fe618a9af4549268dc18c1ae8b382a8b8b86024379a7ca48ca0a0cbadf4a777defe9d66c
-
Filesize
420KB
MD536efbf55a8bea76821c6bb2e37ed7e7e
SHA1a52d23921358ccbb985581f077b1fd40dfc3c326
SHA2568f200dfee5ac086128ce4d94d279e176b6f083096ec369075abe6990d2f80172
SHA512e0a0473093f72db9ecbb855c601a04519b7920ec3db1f4d904db2f29060ad08be3d59932d4ba93d69c1106224f9d223881293a8bb27547d014ebfc5d9fa4157b
-
Filesize
420KB
MD536efbf55a8bea76821c6bb2e37ed7e7e
SHA1a52d23921358ccbb985581f077b1fd40dfc3c326
SHA2568f200dfee5ac086128ce4d94d279e176b6f083096ec369075abe6990d2f80172
SHA512e0a0473093f72db9ecbb855c601a04519b7920ec3db1f4d904db2f29060ad08be3d59932d4ba93d69c1106224f9d223881293a8bb27547d014ebfc5d9fa4157b
-
Filesize
420KB
MD536efbf55a8bea76821c6bb2e37ed7e7e
SHA1a52d23921358ccbb985581f077b1fd40dfc3c326
SHA2568f200dfee5ac086128ce4d94d279e176b6f083096ec369075abe6990d2f80172
SHA512e0a0473093f72db9ecbb855c601a04519b7920ec3db1f4d904db2f29060ad08be3d59932d4ba93d69c1106224f9d223881293a8bb27547d014ebfc5d9fa4157b
-
Filesize
420KB
MD536efbf55a8bea76821c6bb2e37ed7e7e
SHA1a52d23921358ccbb985581f077b1fd40dfc3c326
SHA2568f200dfee5ac086128ce4d94d279e176b6f083096ec369075abe6990d2f80172
SHA512e0a0473093f72db9ecbb855c601a04519b7920ec3db1f4d904db2f29060ad08be3d59932d4ba93d69c1106224f9d223881293a8bb27547d014ebfc5d9fa4157b