Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe
Resource
win10v2004-20220812-en
General
-
Target
b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe
-
Size
303KB
-
MD5
ca38d458ca0f9124800d82272521350c
-
SHA1
188e5a7a19b4fe78f3669171a94817c854ad9306
-
SHA256
b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095
-
SHA512
944a5c53e0baf7320ba350647fdbe99f773a319f6a2c05e5af73116391007a45913a0fd340b0d58effb52bc1ed6e804871b0f0cc2e60b092209fc4eebaacf70c
-
SSDEEP
6144:Jt9AuK7K47+46NvC24o3VO7fy9JT6RCFZL4w9rG8Fza+:fmHK47+M22mZp9rpz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1728 ostyux.exe -
Deletes itself 1 IoCs
pid Process 468 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run ostyux.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Syry\\ostyux.exe" ostyux.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1224 set thread context of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe 1728 ostyux.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 1728 ostyux.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1728 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 28 PID 1224 wrote to memory of 1728 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 28 PID 1224 wrote to memory of 1728 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 28 PID 1224 wrote to memory of 1728 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 28 PID 1224 wrote to memory of 1728 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 28 PID 1224 wrote to memory of 1728 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 28 PID 1224 wrote to memory of 1728 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 28 PID 1728 wrote to memory of 1108 1728 ostyux.exe 12 PID 1728 wrote to memory of 1108 1728 ostyux.exe 12 PID 1728 wrote to memory of 1108 1728 ostyux.exe 12 PID 1728 wrote to memory of 1108 1728 ostyux.exe 12 PID 1728 wrote to memory of 1108 1728 ostyux.exe 12 PID 1728 wrote to memory of 1180 1728 ostyux.exe 11 PID 1728 wrote to memory of 1180 1728 ostyux.exe 11 PID 1728 wrote to memory of 1180 1728 ostyux.exe 11 PID 1728 wrote to memory of 1180 1728 ostyux.exe 11 PID 1728 wrote to memory of 1180 1728 ostyux.exe 11 PID 1728 wrote to memory of 1232 1728 ostyux.exe 10 PID 1728 wrote to memory of 1232 1728 ostyux.exe 10 PID 1728 wrote to memory of 1232 1728 ostyux.exe 10 PID 1728 wrote to memory of 1232 1728 ostyux.exe 10 PID 1728 wrote to memory of 1232 1728 ostyux.exe 10 PID 1728 wrote to memory of 1224 1728 ostyux.exe 8 PID 1728 wrote to memory of 1224 1728 ostyux.exe 8 PID 1728 wrote to memory of 1224 1728 ostyux.exe 8 PID 1728 wrote to memory of 1224 1728 ostyux.exe 8 PID 1728 wrote to memory of 1224 1728 ostyux.exe 8 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29 PID 1224 wrote to memory of 468 1224 b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe"C:\Users\Admin\AppData\Local\Temp\b5f1c27ecbba78618e5b0134bca4bf05141b767772c4856c8d21db49fd555095.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\Syry\ostyux.exe"C:\Users\Admin\AppData\Roaming\Syry\ostyux.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp559adde7.bat"2⤵
- Deletes itself
PID:468
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD54ea99dd96c30450a2695e52d77767ab1
SHA157da8c6abfa4cc5ec1a6ebf081d50c26550c89a0
SHA2565175077fee3a376db41c9c504831717ab15bfce27bd0cd5e081f39f7d648165e
SHA512ea4988aa90cce288d512409b2b2e133f4288e89eaa607e5460bc1c3c96b714ae568ddb6d080491b0d485266f87a8988dcdff3a04d112c69c8a64d3f13a5c43f2
-
Filesize
303KB
MD5ab0d82166dbd474db07af3d11e66ff00
SHA1ed40cca40ae6f942533f3389d27201a39f47b4f0
SHA2566a53793e1071b0b0425bc2b672f69a3035ea67493aa12a0284e3dde2732b16cc
SHA512f805df3fb06932d111e0ed49c5edf4bbc78a4a8327779385c5aa059ca9fd9289c5d717159b8425d5a15332c1c40355fed44d1ca915e3e6f354a5442d7125e19e
-
Filesize
303KB
MD5ab0d82166dbd474db07af3d11e66ff00
SHA1ed40cca40ae6f942533f3389d27201a39f47b4f0
SHA2566a53793e1071b0b0425bc2b672f69a3035ea67493aa12a0284e3dde2732b16cc
SHA512f805df3fb06932d111e0ed49c5edf4bbc78a4a8327779385c5aa059ca9fd9289c5d717159b8425d5a15332c1c40355fed44d1ca915e3e6f354a5442d7125e19e
-
Filesize
303KB
MD5ab0d82166dbd474db07af3d11e66ff00
SHA1ed40cca40ae6f942533f3389d27201a39f47b4f0
SHA2566a53793e1071b0b0425bc2b672f69a3035ea67493aa12a0284e3dde2732b16cc
SHA512f805df3fb06932d111e0ed49c5edf4bbc78a4a8327779385c5aa059ca9fd9289c5d717159b8425d5a15332c1c40355fed44d1ca915e3e6f354a5442d7125e19e