Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe
Resource
win10v2004-20220812-en
General
-
Target
99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe
-
Size
253KB
-
MD5
7eb77d2ef32d7e5bb52882931a7fe460
-
SHA1
334a7620bebbf7d7b9f7febb1077ff26b9c33783
-
SHA256
99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07
-
SHA512
75b577d8e9a88303c614208727da548acef10c3a02e1693f388321eca335276a4f383e60f718d243e2cdbc4652d499559f27b6b7b540392007706f5656a4aef1
-
SSDEEP
3072:AW7RbmjSAr0JAK7W+6mbEQSQ9j0qOqnSXQd+QcWUNoZ75RWetn:Aga+Ar0J3RSQ9j0OnSXQd+tWUNi9Rt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1224 Bmisya.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\KYQ8ZBOAXR = "C:\\Windows\\Bmisya.exe" Bmisya.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Bmisya.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe File created C:\Windows\Bmisya.exe 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe File opened for modification C:\Windows\Bmisya.exe 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main Bmisya.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International Bmisya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe 1224 Bmisya.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe Token: SeBackupPrivilege 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1224 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 27 PID 1672 wrote to memory of 1224 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 27 PID 1672 wrote to memory of 1224 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 27 PID 1672 wrote to memory of 1224 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 27 PID 1672 wrote to memory of 1224 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 27 PID 1672 wrote to memory of 1224 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 27 PID 1672 wrote to memory of 1224 1672 99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe"C:\Users\Admin\AppData\Local\Temp\99a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\Bmisya.exeC:\Windows\Bmisya.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD57eb77d2ef32d7e5bb52882931a7fe460
SHA1334a7620bebbf7d7b9f7febb1077ff26b9c33783
SHA25699a320888c782623542895a961faa43f5f4070849cfe84f7e885bd6b61e7ed07
SHA51275b577d8e9a88303c614208727da548acef10c3a02e1693f388321eca335276a4f383e60f718d243e2cdbc4652d499559f27b6b7b540392007706f5656a4aef1
-
Filesize
408B
MD57f4b56a1d596b25e1af1d86719d4660d
SHA1991c1773afc64712d2330aeef28d589a888cd476
SHA2563868555f9038ce5f444d24b8a1dbd733eabcf66f9ce541457b73af2eedeb576e
SHA512e69cfdf82e7f61fa7d77d6cdcaf8efc8e8bc0a379197a80c140fc3615ce107f8510fc9fcc92125d56849ab76e0231bc854216b19a773d7f1f8c7e1a7832b5706