Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe
Resource
win10v2004-20221111-en
General
-
Target
5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe
-
Size
296KB
-
MD5
40ebee5a3d129c29e04d2907e4f282b1
-
SHA1
b830aee4f5dfc4acdf73abca6bbef1fc8b157289
-
SHA256
5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f
-
SHA512
e5d32f5727ccc912c5d271cee19ebc968a9b7fbb5dffe0d1177ac0358e03347b8af0abe4c21468aba0db43dfed5d44fdf03751ec85b49830cbb24665da69f3d4
-
SSDEEP
6144:Zw02VPodI+qWXgTSlSWbSyCEwRL/ztRPE4sl9UwL4EqGXbQgIn:YxgI+jXblSbNVztRPq4cqGXL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1956 icduq.exe -
Deletes itself 1 IoCs
pid Process 1784 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run icduq.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Icduq = "C:\\Users\\Admin\\AppData\\Roaming\\Ezlu\\icduq.exe" icduq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1612 set thread context of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe 1956 icduq.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1956 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 26 PID 1612 wrote to memory of 1956 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 26 PID 1612 wrote to memory of 1956 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 26 PID 1612 wrote to memory of 1956 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 26 PID 1956 wrote to memory of 1240 1956 icduq.exe 16 PID 1956 wrote to memory of 1240 1956 icduq.exe 16 PID 1956 wrote to memory of 1240 1956 icduq.exe 16 PID 1956 wrote to memory of 1240 1956 icduq.exe 16 PID 1956 wrote to memory of 1240 1956 icduq.exe 16 PID 1956 wrote to memory of 1320 1956 icduq.exe 15 PID 1956 wrote to memory of 1320 1956 icduq.exe 15 PID 1956 wrote to memory of 1320 1956 icduq.exe 15 PID 1956 wrote to memory of 1320 1956 icduq.exe 15 PID 1956 wrote to memory of 1320 1956 icduq.exe 15 PID 1956 wrote to memory of 1356 1956 icduq.exe 14 PID 1956 wrote to memory of 1356 1956 icduq.exe 14 PID 1956 wrote to memory of 1356 1956 icduq.exe 14 PID 1956 wrote to memory of 1356 1956 icduq.exe 14 PID 1956 wrote to memory of 1356 1956 icduq.exe 14 PID 1956 wrote to memory of 1612 1956 icduq.exe 25 PID 1956 wrote to memory of 1612 1956 icduq.exe 25 PID 1956 wrote to memory of 1612 1956 icduq.exe 25 PID 1956 wrote to memory of 1612 1956 icduq.exe 25 PID 1956 wrote to memory of 1612 1956 icduq.exe 25 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27 PID 1612 wrote to memory of 1784 1612 5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe"C:\Users\Admin\AppData\Local\Temp\5a5f2492ced1c16f5decd7a0a94a2f9d8013c26f8da58d864cf16abb61b4315f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Roaming\Ezlu\icduq.exe"C:\Users\Admin\AppData\Roaming\Ezlu\icduq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HECF467.bat"3⤵
- Deletes itself
PID:1784
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD54468c351d13d34f4383c04750281379e
SHA1552734c262e4f964bb35bd640aa01ec96d3267d4
SHA256d9116dc7911fb15f22937d809c0ae4c7d9d3d6afd2c2d5027daefece8d2def71
SHA5121c443dff6adb59f6d0c8726718be22a5a2bd9df59b693ad25c26c247bf89c43f70ea3152e9948de616442f7612c2428f87066bfd0b5a63efc8a30aa4e1902e58
-
Filesize
296KB
MD59a94e977cd6688028498fa8dee8659dc
SHA11ef1bbce5322360319c3e7c4e521107f9325acac
SHA256c7004ca194a862312f86501ad976a0c2b248019bd9d4999c67e6807f7ec7d990
SHA51290002b20e2a09d1b2950601aa05784345193940ac8d1d28f8b21fbbebf44aeb957dc45354968794cebd7996fa43feb19a934b6c3fc66b8b8ef77789c3b3292b5
-
Filesize
296KB
MD59a94e977cd6688028498fa8dee8659dc
SHA11ef1bbce5322360319c3e7c4e521107f9325acac
SHA256c7004ca194a862312f86501ad976a0c2b248019bd9d4999c67e6807f7ec7d990
SHA51290002b20e2a09d1b2950601aa05784345193940ac8d1d28f8b21fbbebf44aeb957dc45354968794cebd7996fa43feb19a934b6c3fc66b8b8ef77789c3b3292b5
-
Filesize
296KB
MD59a94e977cd6688028498fa8dee8659dc
SHA11ef1bbce5322360319c3e7c4e521107f9325acac
SHA256c7004ca194a862312f86501ad976a0c2b248019bd9d4999c67e6807f7ec7d990
SHA51290002b20e2a09d1b2950601aa05784345193940ac8d1d28f8b21fbbebf44aeb957dc45354968794cebd7996fa43feb19a934b6c3fc66b8b8ef77789c3b3292b5
-
Filesize
296KB
MD59a94e977cd6688028498fa8dee8659dc
SHA11ef1bbce5322360319c3e7c4e521107f9325acac
SHA256c7004ca194a862312f86501ad976a0c2b248019bd9d4999c67e6807f7ec7d990
SHA51290002b20e2a09d1b2950601aa05784345193940ac8d1d28f8b21fbbebf44aeb957dc45354968794cebd7996fa43feb19a934b6c3fc66b8b8ef77789c3b3292b5