Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe
Resource
win10v2004-20230703-en
General
-
Target
6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe
-
Size
12.6MB
-
MD5
311d9e31d3a7596ddf1f870dd531834d
-
SHA1
ba53764381cc32354b94aa4c6bbc0396a2bec11e
-
SHA256
6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644
-
SHA512
5eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6
-
SSDEEP
196608:EJYTgM7tWqt/06024m7zoxrCwrV0l51J2tyj02fii1J4zSlYYvHSPus/d:rTiV2p7zoxrTCJJx02fp4WuGsV
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\tbvirsjfyo.sys rar_dqpekb.exe File created C:\Windows\system32\drivers\tngnuwqzlb.sys rar_zknjkz.exe -
Deletes itself 1 IoCs
pid Process 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe -
Executes dropped EXE 4 IoCs
pid Process 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1696 rar_dqpekb.exe 584 rar_zknjkz.exe -
Loads dropped DLL 6 IoCs
pid Process 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 892 Process not Found 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1932 Process not Found -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\W: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\Z: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\A: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\N: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\Q: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\T: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\B: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\E: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\J: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\M: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\S: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\K: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\L: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\O: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\P: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\R: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\G: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\H: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\I: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\V: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\X: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe File opened (read-only) \??\Y: 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 584 rar_zknjkz.exe 584 rar_zknjkz.exe 584 rar_zknjkz.exe 584 rar_zknjkz.exe 1696 rar_dqpekb.exe 1696 rar_dqpekb.exe 1696 rar_dqpekb.exe 1696 rar_dqpekb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2168 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 28 PID 2220 wrote to memory of 2168 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 28 PID 2220 wrote to memory of 2168 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 28 PID 2220 wrote to memory of 2168 2220 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 28 PID 2168 wrote to memory of 1236 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 31 PID 2168 wrote to memory of 1236 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 31 PID 2168 wrote to memory of 1236 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 31 PID 2168 wrote to memory of 1236 2168 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 31 PID 1236 wrote to memory of 1696 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 35 PID 1236 wrote to memory of 1696 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 35 PID 1236 wrote to memory of 1696 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 35 PID 1236 wrote to memory of 1696 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 35 PID 1236 wrote to memory of 584 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 37 PID 1236 wrote to memory of 584 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 37 PID 1236 wrote to memory of 584 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 37 PID 1236 wrote to memory of 584 1236 6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe"C:\Users\Admin\AppData\Local\Temp\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exeC:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe"C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe" d3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\rar_dqpekb.exeC:\Users\Admin\AppData\Local\Temp\rar_dqpekb.exe msg_pyzduo.jpg4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\rar_zknjkz.exeC:\Users\Admin\AppData\Local\Temp\rar_zknjkz.exe msg_gmtdaq.jpg4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:584
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD55b5b91cc5219fd60f8b779c4e67427e7
SHA1a063e36f069729ba085b5f1059c7f3807efd6446
SHA256fc8386617e87699bc3d99b196f189b5d6edc3971f828ef9dff974493da249f4a
SHA5125d1ce7a2e39d8bedc7c53a3a1ec178cdf5754d848feb16b6354e4586f4cd0a0ce9e5c3032283b6b7a01f8d9b357ae73dab1f9beee88325ef4fa8c16a182fba20
-
Filesize
5KB
MD56ef81088e338683845d2ba716f87f282
SHA1769ac4f0d57b79a909fc769b3abf45aa1374b37b
SHA256893b2b12e9902c13020fdca100931b1cf24ff031b246a85d56e5f77c1028d652
SHA5124b3d6cb5e80d4fa095aa95a188fb394da65e711e0c65629f51668247ac4ac53253641e904bed747ffb6b29f094cd84ef5b6741181cc6b7f170e030f4876f9862
-
Filesize
393B
MD5c832ebbeafe5f3dd2ae508c2136c2eb5
SHA14683e9645343dd838a388653b73ef5efa46bdde6
SHA2568d3410be77cf103957d6062cea3cabdc5828787d9a2c542d049d3b50ff06c501
SHA512e4ba0356f6837e64819dfd2b2e42bddc1ca2f4742ea4a45bf1e1b774fa668bf4f5c70b70905cdd436c44738d913f3a9973ee663300b9e406f1b0ffcbfeeb54a5
-
Filesize
102B
MD5b7e0f2ebca8ed87020a6f1bd7aa824ec
SHA18d8e6affbfc37b2bbe320717151e8f6072376f78
SHA256451591daf16728bafa4f6437723322fb9af0a15f55cc3e9c15b51d39562a2512
SHA51219900b56152c77bc557f33172499c762b887d54f54c45c20ba24a77fac4d712da16f320f7334f777c7352f35086e20d358132d8e9c006c20bcd3c382602ab4db
-
Filesize
402KB
MD5b526c779625f4e073f7cd695beab26a0
SHA12c9af45c9b154968c21d92aa461e7ee4b8c90af3
SHA25662d33a207ee917a99a135049afe9b7252c42445b777fc5fcc2f3ce8858604b63
SHA51299a2f2939d8dd0da85839a71eae33197566891358f466f1e2d2d2b1fcebe4f4f7957a441eda08cbf5bc03f115b0b0b6136cf6ad346cf5895d18abb510761e4f0
-
Filesize
402KB
MD5b526c779625f4e073f7cd695beab26a0
SHA12c9af45c9b154968c21d92aa461e7ee4b8c90af3
SHA25662d33a207ee917a99a135049afe9b7252c42445b777fc5fcc2f3ce8858604b63
SHA51299a2f2939d8dd0da85839a71eae33197566891358f466f1e2d2d2b1fcebe4f4f7957a441eda08cbf5bc03f115b0b0b6136cf6ad346cf5895d18abb510761e4f0
-
Filesize
184KB
MD55088a9c819d48f39cba2f321da0daa2b
SHA1a685b428fb97416985e728a32048476ce79b9f85
SHA2560815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9
SHA51291979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e
-
Filesize
184KB
MD55088a9c819d48f39cba2f321da0daa2b
SHA1a685b428fb97416985e728a32048476ce79b9f85
SHA2560815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9
SHA51291979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e
-
Filesize
12.6MB
MD5311d9e31d3a7596ddf1f870dd531834d
SHA1ba53764381cc32354b94aa4c6bbc0396a2bec11e
SHA2566b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644
SHA5125eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6
-
Filesize
12.6MB
MD5311d9e31d3a7596ddf1f870dd531834d
SHA1ba53764381cc32354b94aa4c6bbc0396a2bec11e
SHA2566b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644
SHA5125eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6
-
Filesize
12.6MB
MD5311d9e31d3a7596ddf1f870dd531834d
SHA1ba53764381cc32354b94aa4c6bbc0396a2bec11e
SHA2566b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644
SHA5125eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6
-
Filesize
12.6MB
MD5311d9e31d3a7596ddf1f870dd531834d
SHA1ba53764381cc32354b94aa4c6bbc0396a2bec11e
SHA2566b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644
SHA5125eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6
-
Filesize
184KB
MD55088a9c819d48f39cba2f321da0daa2b
SHA1a685b428fb97416985e728a32048476ce79b9f85
SHA2560815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9
SHA51291979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e
-
Filesize
184KB
MD55088a9c819d48f39cba2f321da0daa2b
SHA1a685b428fb97416985e728a32048476ce79b9f85
SHA2560815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9
SHA51291979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e
-
Filesize
184KB
MD55088a9c819d48f39cba2f321da0daa2b
SHA1a685b428fb97416985e728a32048476ce79b9f85
SHA2560815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9
SHA51291979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e
-
Filesize
184KB
MD55088a9c819d48f39cba2f321da0daa2b
SHA1a685b428fb97416985e728a32048476ce79b9f85
SHA2560815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9
SHA51291979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e
-
Filesize
12.6MB
MD5311d9e31d3a7596ddf1f870dd531834d
SHA1ba53764381cc32354b94aa4c6bbc0396a2bec11e
SHA2566b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644
SHA5125eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6
-
Filesize
12.6MB
MD5311d9e31d3a7596ddf1f870dd531834d
SHA1ba53764381cc32354b94aa4c6bbc0396a2bec11e
SHA2566b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644
SHA5125eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6