Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/02/2023, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
301KB
-
MD5
ae9dc34b6a8ea00485a79cc48fc59662
-
SHA1
0e623ec7aaa91275e2fb0bcad85caa360b1fd296
-
SHA256
3878ebdeaa9e027240ca37b48fc74c9d1f1e58e17708d33b050af65cc2ac66e1
-
SHA512
a4dd1994fddd471c5ad4394e4c85f9f762bc4a82286d5e902fc5b837d7a9bc5c28e2098b802e21243d833e7b1f8fc6f154857f4712c721d0d1e25d383508a0ae
-
SSDEEP
3072:CBLb6b6cLxMRGDLx1l9yy70oMh5KGlF2Lw9M4uQjiMTE5/3RbPafVi:C1ZcLxzR1/ooTfLw9BuQj9M3lPat
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\gopybkpb = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1200 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\gopybkpb\ImagePath = "C:\\Windows\\SysWOW64\\gopybkpb\\admxxttq.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 1668 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1608 admxxttq.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1608 set thread context of 1668 1608 admxxttq.exe 40 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1824 sc.exe 1444 sc.exe 988 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 9c38583dbaf3cf0124edb47d450dd49d084297dce82e72baa49d17fd647c771d9f57ce9086cd945d24edb47d470dd49d024195daf71261adc06d04fda6e22673bbc9154961cda56810d48045773ae4ab644490bdb17a21ef925900c5f78d3c74bbc4103d29fea46810dd804d773fd4f10b4c90d8f6127db9a4593494b48d652dd39c460431faad6d249ec60b1b79bdf0012dd98cb37d27ed91550cfda8e2377c88f2005469a8946c11d98d497c3ee3ac542d109d8d4dabe3ff3134fdc48d551de4ad035276a6cb2e569bb47d440dd49d642d83d70d5b51dda46d34fe089f571de4ad750534e3a26b0ada81537638e09d642df4bd844d14dda46d34fdc48d541de4ad743d04cd945d24edb47d440dd49d642df4bd844d14dda46d34fdc48d541de4ad74de05cd94 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 840 wrote to memory of 1980 840 file.exe 27 PID 840 wrote to memory of 1980 840 file.exe 27 PID 840 wrote to memory of 1980 840 file.exe 27 PID 840 wrote to memory of 1980 840 file.exe 27 PID 840 wrote to memory of 688 840 file.exe 29 PID 840 wrote to memory of 688 840 file.exe 29 PID 840 wrote to memory of 688 840 file.exe 29 PID 840 wrote to memory of 688 840 file.exe 29 PID 840 wrote to memory of 1824 840 file.exe 31 PID 840 wrote to memory of 1824 840 file.exe 31 PID 840 wrote to memory of 1824 840 file.exe 31 PID 840 wrote to memory of 1824 840 file.exe 31 PID 840 wrote to memory of 1444 840 file.exe 33 PID 840 wrote to memory of 1444 840 file.exe 33 PID 840 wrote to memory of 1444 840 file.exe 33 PID 840 wrote to memory of 1444 840 file.exe 33 PID 840 wrote to memory of 988 840 file.exe 35 PID 840 wrote to memory of 988 840 file.exe 35 PID 840 wrote to memory of 988 840 file.exe 35 PID 840 wrote to memory of 988 840 file.exe 35 PID 840 wrote to memory of 1200 840 file.exe 38 PID 840 wrote to memory of 1200 840 file.exe 38 PID 840 wrote to memory of 1200 840 file.exe 38 PID 840 wrote to memory of 1200 840 file.exe 38 PID 1608 wrote to memory of 1668 1608 admxxttq.exe 40 PID 1608 wrote to memory of 1668 1608 admxxttq.exe 40 PID 1608 wrote to memory of 1668 1608 admxxttq.exe 40 PID 1608 wrote to memory of 1668 1608 admxxttq.exe 40 PID 1608 wrote to memory of 1668 1608 admxxttq.exe 40 PID 1608 wrote to memory of 1668 1608 admxxttq.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gopybkpb\2⤵PID:1980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\admxxttq.exe" C:\Windows\SysWOW64\gopybkpb\2⤵PID:688
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gopybkpb binPath= "C:\Windows\SysWOW64\gopybkpb\admxxttq.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1824
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gopybkpb "wifi internet conection"2⤵
- Launches sc.exe
PID:1444
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gopybkpb2⤵
- Launches sc.exe
PID:988
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1200
-
-
C:\Windows\SysWOW64\gopybkpb\admxxttq.exeC:\Windows\SysWOW64\gopybkpb\admxxttq.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.2MB
MD5cdbfc498f1dcb8a1d07f2033e97c83b9
SHA18b4befd43fb3d20f56406e2df1941d50db11d2e3
SHA2567c61d07330bfe552f8fa44be65600dc094865d191829541527ecf624e21211a1
SHA512d06f8a16972da7c1554e70d19560624968f7c0327c04caab3a312c883899ff1c07c6f4f2d6cb4a6fb05f72a716a4600828262d4aab11bc7fd57b888f7db027a2
-
Filesize
11.2MB
MD5cdbfc498f1dcb8a1d07f2033e97c83b9
SHA18b4befd43fb3d20f56406e2df1941d50db11d2e3
SHA2567c61d07330bfe552f8fa44be65600dc094865d191829541527ecf624e21211a1
SHA512d06f8a16972da7c1554e70d19560624968f7c0327c04caab3a312c883899ff1c07c6f4f2d6cb4a6fb05f72a716a4600828262d4aab11bc7fd57b888f7db027a2