Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 12:56

General

  • Target

    ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe

  • Size

    420KB

  • MD5

    96753f510be9b8d3ef3ce5cdb749cde2

  • SHA1

    eb346a2dd1925717f94edb53ba8ab0cdb19747fb

  • SHA256

    ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6

  • SHA512

    24837bca3a8153aba65ea9def178d01e5ca684146c96c6bac80a6ce7d2f787efaa2ff94ffcdd75839e747a9ebe5723e91b0ec717315266500c214788780f6ccf

  • SSDEEP

    6144:n4pPAtXzbCtWiViuXxXRqqY8k8uzAKUVjO8d+qVMjcwPnYyxwiwFwgwsv:4BAtE+kvBKZ8d+qVwTfYxv

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe
    "C:\Users\Admin\AppData\Local\Temp\ccd42d19f727d1dd6b1314bb93cb2c2650fbd4c45010e4d160e1b708abdc3fc6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Roaming\Ikinmy\qivi.exe
      "C:\Users\Admin\AppData\Roaming\Ikinmy\qivi.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2040
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpbbf9c9c5.bat"
      2⤵
      • Deletes itself
      PID:1652
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1176
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1124

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpbbf9c9c5.bat

          Filesize

          307B

          MD5

          97bd6cf792881bbb362f6735fac5dc36

          SHA1

          078cc6d2687f22827544669715234bb40e3afef2

          SHA256

          5f8b656fbd2dfcadfb8d93142e8a5418995bdbdeaff76dfced6f519ee8890ae9

          SHA512

          40b475eb10f0e273eec567ffeac22a8620d50eac0cd6d563245486c8fe618a9af4549268dc18c1ae8b382a8b8b86024379a7ca48ca0a0cbadf4a777defe9d66c

        • C:\Users\Admin\AppData\Roaming\Ikinmy\qivi.exe

          Filesize

          420KB

          MD5

          36efbf55a8bea76821c6bb2e37ed7e7e

          SHA1

          a52d23921358ccbb985581f077b1fd40dfc3c326

          SHA256

          8f200dfee5ac086128ce4d94d279e176b6f083096ec369075abe6990d2f80172

          SHA512

          e0a0473093f72db9ecbb855c601a04519b7920ec3db1f4d904db2f29060ad08be3d59932d4ba93d69c1106224f9d223881293a8bb27547d014ebfc5d9fa4157b

        • C:\Users\Admin\AppData\Roaming\Ikinmy\qivi.exe

          Filesize

          420KB

          MD5

          36efbf55a8bea76821c6bb2e37ed7e7e

          SHA1

          a52d23921358ccbb985581f077b1fd40dfc3c326

          SHA256

          8f200dfee5ac086128ce4d94d279e176b6f083096ec369075abe6990d2f80172

          SHA512

          e0a0473093f72db9ecbb855c601a04519b7920ec3db1f4d904db2f29060ad08be3d59932d4ba93d69c1106224f9d223881293a8bb27547d014ebfc5d9fa4157b

        • \Users\Admin\AppData\Roaming\Ikinmy\qivi.exe

          Filesize

          420KB

          MD5

          36efbf55a8bea76821c6bb2e37ed7e7e

          SHA1

          a52d23921358ccbb985581f077b1fd40dfc3c326

          SHA256

          8f200dfee5ac086128ce4d94d279e176b6f083096ec369075abe6990d2f80172

          SHA512

          e0a0473093f72db9ecbb855c601a04519b7920ec3db1f4d904db2f29060ad08be3d59932d4ba93d69c1106224f9d223881293a8bb27547d014ebfc5d9fa4157b

        • \Users\Admin\AppData\Roaming\Ikinmy\qivi.exe

          Filesize

          420KB

          MD5

          36efbf55a8bea76821c6bb2e37ed7e7e

          SHA1

          a52d23921358ccbb985581f077b1fd40dfc3c326

          SHA256

          8f200dfee5ac086128ce4d94d279e176b6f083096ec369075abe6990d2f80172

          SHA512

          e0a0473093f72db9ecbb855c601a04519b7920ec3db1f4d904db2f29060ad08be3d59932d4ba93d69c1106224f9d223881293a8bb27547d014ebfc5d9fa4157b

        • memory/1124-64-0x0000000001CB0000-0x0000000001CFC000-memory.dmp

          Filesize

          304KB

        • memory/1124-66-0x0000000001CB0000-0x0000000001CFC000-memory.dmp

          Filesize

          304KB

        • memory/1124-67-0x0000000001CB0000-0x0000000001CFC000-memory.dmp

          Filesize

          304KB

        • memory/1124-68-0x0000000001CB0000-0x0000000001CFC000-memory.dmp

          Filesize

          304KB

        • memory/1124-69-0x0000000001CB0000-0x0000000001CFC000-memory.dmp

          Filesize

          304KB

        • memory/1176-73-0x00000000001E0000-0x000000000022C000-memory.dmp

          Filesize

          304KB

        • memory/1176-74-0x00000000001E0000-0x000000000022C000-memory.dmp

          Filesize

          304KB

        • memory/1176-75-0x00000000001E0000-0x000000000022C000-memory.dmp

          Filesize

          304KB

        • memory/1176-72-0x00000000001E0000-0x000000000022C000-memory.dmp

          Filesize

          304KB

        • memory/1220-79-0x00000000029B0000-0x00000000029FC000-memory.dmp

          Filesize

          304KB

        • memory/1220-81-0x00000000029B0000-0x00000000029FC000-memory.dmp

          Filesize

          304KB

        • memory/1220-78-0x00000000029B0000-0x00000000029FC000-memory.dmp

          Filesize

          304KB

        • memory/1220-80-0x00000000029B0000-0x00000000029FC000-memory.dmp

          Filesize

          304KB

        • memory/1624-98-0x00000000022E0000-0x000000000232C000-memory.dmp

          Filesize

          304KB

        • memory/1624-57-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1624-54-0x00000000753C1000-0x00000000753C3000-memory.dmp

          Filesize

          8KB

        • memory/1624-56-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1624-84-0x00000000022E0000-0x000000000232C000-memory.dmp

          Filesize

          304KB

        • memory/1624-85-0x00000000022E0000-0x000000000232C000-memory.dmp

          Filesize

          304KB

        • memory/1624-86-0x00000000022E0000-0x000000000232C000-memory.dmp

          Filesize

          304KB

        • memory/1624-87-0x00000000022E0000-0x000000000232C000-memory.dmp

          Filesize

          304KB

        • memory/1624-55-0x0000000000280000-0x00000000002CC000-memory.dmp

          Filesize

          304KB

        • memory/1624-97-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1624-96-0x0000000000280000-0x00000000002CC000-memory.dmp

          Filesize

          304KB

        • memory/1652-93-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1652-94-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1652-92-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1652-101-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1652-100-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1652-90-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1652-105-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/2040-102-0x0000000000280000-0x00000000002CC000-memory.dmp

          Filesize

          304KB

        • memory/2040-103-0x0000000000400000-0x0000000000468000-memory.dmp

          Filesize

          416KB

        • memory/2040-106-0x0000000000400000-0x0000000000468000-memory.dmp

          Filesize

          416KB