Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03/08/2023, 18:23
Behavioral task
behavioral1
Sample
5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe
Resource
win7-20230712-en
General
-
Target
5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe
-
Size
6.9MB
-
MD5
57794b001e1e8c4917aaa864268fec36
-
SHA1
825e7a4c79f47d61df14a140398c2770ab22fb65
-
SHA256
5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
-
SHA512
5854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
SSDEEP
196608:gbJEeOGZPuknu4TNAzGx2tXuqIg1YJwPj:gbaElhDSus1YJwPj
Malware Config
Extracted
amadey
3.85
45.9.74.166/b7djSDcPcZ/index.php
45.9.74.141/b7djSDcPcZ/index.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2408 bstyoops.exe 2772 bstyoops.exe 1244 bstyoops.exe -
Loads dropped DLL 1 IoCs
pid Process 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe -
resource yara_rule behavioral1/memory/2624-54-0x0000000001240000-0x0000000001ED6000-memory.dmp vmprotect behavioral1/memory/2624-59-0x0000000001240000-0x0000000001ED6000-memory.dmp vmprotect behavioral1/files/0x000b000000012267-67.dat vmprotect behavioral1/files/0x000b000000012267-66.dat vmprotect behavioral1/files/0x000b000000012267-69.dat vmprotect behavioral1/memory/2408-70-0x0000000000EC0000-0x0000000001B56000-memory.dmp vmprotect behavioral1/memory/2408-75-0x0000000000EC0000-0x0000000001B56000-memory.dmp vmprotect behavioral1/files/0x000b000000012267-77.dat vmprotect behavioral1/files/0x000b000000012267-78.dat vmprotect behavioral1/memory/2772-79-0x0000000000EC0000-0x0000000001B56000-memory.dmp vmprotect behavioral1/memory/2772-84-0x0000000000EC0000-0x0000000001B56000-memory.dmp vmprotect behavioral1/files/0x000b000000012267-86.dat vmprotect behavioral1/memory/1244-87-0x0000000000EC0000-0x0000000001B56000-memory.dmp vmprotect behavioral1/memory/1244-92-0x0000000000EC0000-0x0000000001B56000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2440 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2408 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 28 PID 2624 wrote to memory of 2408 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 28 PID 2624 wrote to memory of 2408 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 28 PID 2624 wrote to memory of 2408 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 28 PID 2624 wrote to memory of 2408 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 28 PID 2624 wrote to memory of 2408 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 28 PID 2624 wrote to memory of 2408 2624 5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe 28 PID 2408 wrote to memory of 2440 2408 bstyoops.exe 29 PID 2408 wrote to memory of 2440 2408 bstyoops.exe 29 PID 2408 wrote to memory of 2440 2408 bstyoops.exe 29 PID 2408 wrote to memory of 2440 2408 bstyoops.exe 29 PID 2408 wrote to memory of 2396 2408 bstyoops.exe 31 PID 2408 wrote to memory of 2396 2408 bstyoops.exe 31 PID 2408 wrote to memory of 2396 2408 bstyoops.exe 31 PID 2408 wrote to memory of 2396 2408 bstyoops.exe 31 PID 2396 wrote to memory of 2268 2396 cmd.exe 33 PID 2396 wrote to memory of 2268 2396 cmd.exe 33 PID 2396 wrote to memory of 2268 2396 cmd.exe 33 PID 2396 wrote to memory of 2268 2396 cmd.exe 33 PID 2396 wrote to memory of 2392 2396 cmd.exe 34 PID 2396 wrote to memory of 2392 2396 cmd.exe 34 PID 2396 wrote to memory of 2392 2396 cmd.exe 34 PID 2396 wrote to memory of 2392 2396 cmd.exe 34 PID 2396 wrote to memory of 2908 2396 cmd.exe 35 PID 2396 wrote to memory of 2908 2396 cmd.exe 35 PID 2396 wrote to memory of 2908 2396 cmd.exe 35 PID 2396 wrote to memory of 2908 2396 cmd.exe 35 PID 2396 wrote to memory of 1636 2396 cmd.exe 36 PID 2396 wrote to memory of 1636 2396 cmd.exe 36 PID 2396 wrote to memory of 1636 2396 cmd.exe 36 PID 2396 wrote to memory of 1636 2396 cmd.exe 36 PID 2396 wrote to memory of 1036 2396 cmd.exe 37 PID 2396 wrote to memory of 1036 2396 cmd.exe 37 PID 2396 wrote to memory of 1036 2396 cmd.exe 37 PID 2396 wrote to memory of 1036 2396 cmd.exe 37 PID 2396 wrote to memory of 2608 2396 cmd.exe 38 PID 2396 wrote to memory of 2608 2396 cmd.exe 38 PID 2396 wrote to memory of 2608 2396 cmd.exe 38 PID 2396 wrote to memory of 2608 2396 cmd.exe 38 PID 2708 wrote to memory of 2772 2708 taskeng.exe 44 PID 2708 wrote to memory of 2772 2708 taskeng.exe 44 PID 2708 wrote to memory of 2772 2708 taskeng.exe 44 PID 2708 wrote to memory of 2772 2708 taskeng.exe 44 PID 2708 wrote to memory of 2772 2708 taskeng.exe 44 PID 2708 wrote to memory of 2772 2708 taskeng.exe 44 PID 2708 wrote to memory of 2772 2708 taskeng.exe 44 PID 2708 wrote to memory of 1244 2708 taskeng.exe 45 PID 2708 wrote to memory of 1244 2708 taskeng.exe 45 PID 2708 wrote to memory of 1244 2708 taskeng.exe 45 PID 2708 wrote to memory of 1244 2708 taskeng.exe 45 PID 2708 wrote to memory of 1244 2708 taskeng.exe 45 PID 2708 wrote to memory of 1244 2708 taskeng.exe 45 PID 2708 wrote to memory of 1244 2708 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\5514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862exe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe" /F3⤵
- Creates scheduled task(s)
PID:2440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "Admin:N"&&CACLS "bstyoops.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "Admin:N"&&CACLS "..\c2868ed41c" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:N"4⤵PID:2392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:R" /E4⤵PID:2908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:N"4⤵PID:1036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:R" /E4⤵PID:2608
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E07D4D49-AAC1-49A5-BD5D-127C07DF9225} S-1-5-21-722410544-1258951091-1992882075-1000:MGKTNXNO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe2⤵
- Executes dropped EXE
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2
-
Filesize
6.9MB
MD557794b001e1e8c4917aaa864268fec36
SHA1825e7a4c79f47d61df14a140398c2770ab22fb65
SHA2565514e5a91e4b192cae4f78fc9d4d10641704c3778d0fd418f305b081ba5b9862
SHA5125854c92417a8ca5fb9423483000bf26bb6bba7c89c414512efc5189f416f6f074d965d20ef279488033d06ba09a31d253b8de80f198ccaa81e792c463d3bd0a2