Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
248s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe
Resource
win10v2004-20220901-en
General
-
Target
955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe
-
Size
129KB
-
MD5
e44cf997ab41fd6bae63e4e6b4a3c0f1
-
SHA1
87fd2df0baf51210691bd073a2afad72b7f9461d
-
SHA256
955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a
-
SHA512
927c281badb14f7210d38172250fea5f5cdd516ca9dc0d72b528131a4eb9c4d6d1c528b62b871f44df0a4b1c7e1ff594514cb3a3f618a0759953b5f81ab52921
-
SSDEEP
3072:doK2HC2jtsrenrlvRvz4Evo+TTSPeHrV/T4Ra:uEAtsen5J8E9TTSPeHZr4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1528 obhuh.exe -
Loads dropped DLL 2 IoCs
pid Process 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\Currentversion\Run obhuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F8E4B76A-8C76-54F0-9B59-157B953A6902} = "C:\\Users\\Admin\\AppData\\Roaming\\Afxo\\obhuh.exe" obhuh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 544 set thread context of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe 1528 obhuh.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe Token: SeSecurityPrivilege 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe Token: SeSecurityPrivilege 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe Token: SeSecurityPrivilege 768 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1572 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 544 wrote to memory of 1528 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 28 PID 544 wrote to memory of 1528 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 28 PID 544 wrote to memory of 1528 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 28 PID 544 wrote to memory of 1528 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 28 PID 1528 wrote to memory of 1156 1528 obhuh.exe 17 PID 1528 wrote to memory of 1156 1528 obhuh.exe 17 PID 1528 wrote to memory of 1156 1528 obhuh.exe 17 PID 1528 wrote to memory of 1156 1528 obhuh.exe 17 PID 1528 wrote to memory of 1156 1528 obhuh.exe 17 PID 1528 wrote to memory of 1236 1528 obhuh.exe 16 PID 1528 wrote to memory of 1236 1528 obhuh.exe 16 PID 1528 wrote to memory of 1236 1528 obhuh.exe 16 PID 1528 wrote to memory of 1236 1528 obhuh.exe 16 PID 1528 wrote to memory of 1236 1528 obhuh.exe 16 PID 1528 wrote to memory of 1272 1528 obhuh.exe 15 PID 1528 wrote to memory of 1272 1528 obhuh.exe 15 PID 1528 wrote to memory of 1272 1528 obhuh.exe 15 PID 1528 wrote to memory of 1272 1528 obhuh.exe 15 PID 1528 wrote to memory of 1272 1528 obhuh.exe 15 PID 1528 wrote to memory of 544 1528 obhuh.exe 27 PID 1528 wrote to memory of 544 1528 obhuh.exe 27 PID 1528 wrote to memory of 544 1528 obhuh.exe 27 PID 1528 wrote to memory of 544 1528 obhuh.exe 27 PID 1528 wrote to memory of 544 1528 obhuh.exe 27 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 544 wrote to memory of 768 544 955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe 29 PID 1528 wrote to memory of 1476 1528 obhuh.exe 30 PID 1528 wrote to memory of 1476 1528 obhuh.exe 30 PID 1528 wrote to memory of 1476 1528 obhuh.exe 30 PID 1528 wrote to memory of 1476 1528 obhuh.exe 30 PID 1528 wrote to memory of 1476 1528 obhuh.exe 30 PID 1528 wrote to memory of 896 1528 obhuh.exe 31 PID 1528 wrote to memory of 896 1528 obhuh.exe 31 PID 1528 wrote to memory of 896 1528 obhuh.exe 31 PID 1528 wrote to memory of 896 1528 obhuh.exe 31 PID 1528 wrote to memory of 896 1528 obhuh.exe 31 PID 1528 wrote to memory of 188 1528 obhuh.exe 32 PID 1528 wrote to memory of 188 1528 obhuh.exe 32 PID 1528 wrote to memory of 188 1528 obhuh.exe 32 PID 1528 wrote to memory of 188 1528 obhuh.exe 32 PID 1528 wrote to memory of 188 1528 obhuh.exe 32 PID 1528 wrote to memory of 1572 1528 obhuh.exe 33 PID 1528 wrote to memory of 1572 1528 obhuh.exe 33 PID 1528 wrote to memory of 1572 1528 obhuh.exe 33 PID 1528 wrote to memory of 1572 1528 obhuh.exe 33 PID 1528 wrote to memory of 1572 1528 obhuh.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe"C:\Users\Admin\AppData\Local\Temp\955a6b4f98244dcbd5a824a983fccc3e21b605e168fbfefab9368e8a43f7074a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\Afxo\obhuh.exe"C:\Users\Admin\AppData\Roaming\Afxo\obhuh.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp1757409c.bat"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1236
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1156
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1753579364-1329706934861461990-15378150192077980647-1222295059-9895648401793765482"1⤵PID:1476
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:896
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:188
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD56c1dc6a36b6137db548ea3854621b35e
SHA14118aed5f2a6a49841f4c49f06c727529ea9de51
SHA2569c688164f4ac3fb2211f596e37f4ceaff4068eaa20f9871f0ea46ba888e41797
SHA51279629a98efdd19b45d8719c053030a0731767c80ddbfe21c5733a74d9042fe6dd5900c7690d0069c5bdba25e6b9d19c7b18f65786ec3176e06be0757292f0c89
-
Filesize
129KB
MD56c1dc6a36b6137db548ea3854621b35e
SHA14118aed5f2a6a49841f4c49f06c727529ea9de51
SHA2569c688164f4ac3fb2211f596e37f4ceaff4068eaa20f9871f0ea46ba888e41797
SHA51279629a98efdd19b45d8719c053030a0731767c80ddbfe21c5733a74d9042fe6dd5900c7690d0069c5bdba25e6b9d19c7b18f65786ec3176e06be0757292f0c89
-
Filesize
398B
MD5bc9afba275e63f02ebe76467f7e81921
SHA1d0c648732de2fcac7940fa72996db75809eb0e30
SHA256bf4d1438881dc5989986e8a8717784567acd3aa8aebfce9a5ec88a29e4edfd1b
SHA512b55e5ae7e2d43c8312dd0fddbbc5adf58b855b7cd50688234da702dfbf058651e6dab95ee67c493eed51ddec64ed3f7613ac64655e23e335cc989d8c35a19ee7
-
Filesize
129KB
MD56c1dc6a36b6137db548ea3854621b35e
SHA14118aed5f2a6a49841f4c49f06c727529ea9de51
SHA2569c688164f4ac3fb2211f596e37f4ceaff4068eaa20f9871f0ea46ba888e41797
SHA51279629a98efdd19b45d8719c053030a0731767c80ddbfe21c5733a74d9042fe6dd5900c7690d0069c5bdba25e6b9d19c7b18f65786ec3176e06be0757292f0c89
-
Filesize
129KB
MD56c1dc6a36b6137db548ea3854621b35e
SHA14118aed5f2a6a49841f4c49f06c727529ea9de51
SHA2569c688164f4ac3fb2211f596e37f4ceaff4068eaa20f9871f0ea46ba888e41797
SHA51279629a98efdd19b45d8719c053030a0731767c80ddbfe21c5733a74d9042fe6dd5900c7690d0069c5bdba25e6b9d19c7b18f65786ec3176e06be0757292f0c89