Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2023, 18:02

General

  • Target

    9f7902e3711c689cb5b8874e3f4ffc02_JC.exe

  • Size

    206KB

  • MD5

    9f7902e3711c689cb5b8874e3f4ffc02

  • SHA1

    65ba3c5266bb273610ea82ae931f55bdc0c01a9f

  • SHA256

    4d7c229c22ac534569f6b3dd2a419bd99fa0f42635430e237be17c76473bed2c

  • SHA512

    102c089ab60c3e30b1cf8958ce534981ed19bb8de29b30a739975f66b9a0d5cf0b91ae223202e8531e458b5c02d8287e032fb31f4c4e42c0304705191ca0b772

  • SSDEEP

    3072:unY9tqi07/+8qZip+YRADRddUpBYzkcGSaUyRt6umF4T/L+htRTA5M9Qfcl:uY9P07/O2+UGd0HPRhT/L+hU5wkcl

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f7902e3711c689cb5b8874e3f4ffc02_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\9f7902e3711c689cb5b8874e3f4ffc02_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\galynuh.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    93KB

    MD5

    a580c4d1c4e92154171a91c87a49d74d

    SHA1

    ba012d944b8c3a7d51fea066dfded850182c6a80

    SHA256

    2fb9560859dc4e5b568c4df076458ddbfe83fa562c21a885ea5fcbe8fbac331d

    SHA512

    1e5d0e5eecc8013924bf7edab351b689c86580bcde756aa18511b286076856437d2f90c3c16b1522b428bcd638fbc693f82fc5545bb2f5c6e5022b4252099c61

  • C:\Program Files (x86)\Windows Defender\lyrysor.com

    Filesize

    1KB

    MD5

    f1f89b01465f5433ab9935e5ae53d267

    SHA1

    b0e508be96195c5de964a5a8a9369bbe2781c9b2

    SHA256

    adcfd899be0923b734679eba34680db7179456c0916142959d5b63ba7264c99d

    SHA512

    82d5d49275ba533f17daf456b9ab0c18850473aaff3d7a69e8da095e83ef9c108a8aa3ca164ad0730e258be9ab6ae3d8fd7bccefe5653e533e19d56b62e720d7

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    300B

    MD5

    307a9f18216bcc80837dd67a7f955a18

    SHA1

    a8652eb85b4ba5da7524e9969b977a268b112414

    SHA256

    4d6f38d65f8df9c914c597288ead065f58bc49be59a67e1f82c0b2215fec18fa

    SHA512

    80997b227ab1ac413d7f30f14fd604389980477a516ccc129cba17974a021d07da7169ef3f19c05a527ce56454bd9f53a144ab45f696faf3c684174ccaa70f7b

  • C:\Program Files (x86)\Windows Defender\purylev.com

    Filesize

    2KB

    MD5

    a8fdd0012e6998420474a0c0669327c4

    SHA1

    aa0b687e766c259a247c16677f4c631ce542fc6e

    SHA256

    85a0119ffb919c7b1157dabbc8e40897f97ce6544f89931e503564966057d5d6

    SHA512

    bd834b7119f51ef0c741d2c0696e449e13a003140ad631f5e272130cac2d30f8cb25a5e76cc415ddf6208ee920efed6c7c33519b8f1bd02dd4ae8d3f39e926f5

  • C:\Program Files (x86)\Windows Defender\purypol.com

    Filesize

    2KB

    MD5

    3e13bef1345cad73b852689375c5b637

    SHA1

    e65e21ac6ae65a6c5a39bc736fdfe84062d3e065

    SHA256

    e3100d8708388940fc3d8a9cc7a425fbdf4b5a68689d935fa78512c1939e0807

    SHA512

    ed563d3c3f6faf39fda9ff6f76cd56da020338624be26a35f8cddcb765635a50c9511b0e205428804c7521c546c1eb0c37298baa039cf00965d5334f68d4f8f2

  • C:\Program Files (x86)\Windows Defender\puzylyp.com

    Filesize

    2KB

    MD5

    380b781559981efc06739b3b6388425d

    SHA1

    12f569be4dfc4464ffcc74ea4089aaddf8160641

    SHA256

    0a2df4a2faa1e73acd55c575f362642ce3a109ba44fc6dd3f2a91f6f74ecf128

    SHA512

    38ed2af663aadb88e2c20c8b465abffdf19193714bdf30e830e45a15c0cc13dfdb5726bc8c1b1948191365179561ebb95000929ed9fcd44888fb6f664d6f7cdd

  • C:\Program Files (x86)\Windows Defender\qexynyp.com

    Filesize

    300B

    MD5

    772a6d3f32312a1f4478a0b09a518b4d

    SHA1

    d66f0cf2ea5d51120f26f5b1f556731e17f39e62

    SHA256

    f249e32aa111b4bc09ca586a5d4b6e1a701bf5f6c4d5a3dafc1dbd3dad6c753b

    SHA512

    fb83cc0fd6b7ea839201e6f42b34ca62feef63f340f5c9c392390e42ce9ba0ee1e9963637f77a7844f8fe61d5a78ab5b2e6d184deb6cd58dac7b40f04112f7cf

  • C:\Program Files (x86)\Windows Defender\vofycot.com

    Filesize

    302B

    MD5

    7cae644883bbc206ca5c63d7b1b95d82

    SHA1

    407eb8f5181d19222dc37fd7551fa64d0e07d862

    SHA256

    f4ceaad75b70a99f16970b03180264b6089e4122daf0bde8fc9107b2f25ecf5a

    SHA512

    1c7778c044f90631605b090ab27cc26dfdfd094753bc64b45b49bb7676c3a176a1211e27d0aa028147297c5f63d8a9d6481da9b06018eb3195e2dc1000013284

  • C:\Program Files (x86)\Windows Defender\vonyket.com

    Filesize

    302B

    MD5

    9b00d89fea920793eda02cdfae0ebc9d

    SHA1

    d72233d0fa6ce5edc9be11ce61ac94bf743f5192

    SHA256

    9e16abd3696277108f98df7b622d32d3ec71b0cb2184c1be11fe428aa6c33f55

    SHA512

    be807c7fb1106f28cb9521b45989adbd894628068e1d8a3d56d46878661cdfca15710acbc1d8ef92255c9c00f423739842cc9afa992844323c232e0c39d2d3e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d543111b8f3495b9e1a3235f133337f4

    SHA1

    a225f8fa748a13a20e74a205310a58f8acd40872

    SHA256

    c2663f0a5bf316ab30f425d406c68fe951391ee5a6a98a1601db84c6e856f145

    SHA512

    bd70b0d6f6e48ffcca9be1cd57dcbd3f553fc47364b0ad2fd2de6976153f0544fac3148c0693b899a3a9e5f882d5739438d19567929bacc169552010e3f11b8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d19d5510fad735f2aebc6fe0af1124a

    SHA1

    fb4b6c47500bdfc238daa61a28044987d0a102a9

    SHA256

    56c8e8993c2d59d7ba29a163a8e193b04ef7302a9f638cbade9e194f29bd2f7c

    SHA512

    3e77d5d175d80b90efefd903b7b9176280b2c5f893f8f941c13662dfe9fe537bf1d4ab2680a624583d9804cbe48be5d49ad31ad4fc4aefab2762d32e9ff5678e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    074cced897b1782aaa2d015a038e915e

    SHA1

    d51a8adcbd5a8edf886ae51e07b3cd4cacf66783

    SHA256

    39f2245a9c53e7f49cc2c6ff22ef6b4229752f6e487b912a002f3ed98ee32183

    SHA512

    5ffee728a5d053a456f87e8a002b4a0f4b5d3107692358fea61c7be1c65577737335b716de4624e88c049003afeb8b3b21cd93e6f5b56aed0416b61a6d993dd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8d53499639a993c1899c5d98266dc37

    SHA1

    22b1e0e3fd218080cfba4d0c688fc2ce7fc728e1

    SHA256

    1516b145512719608b95b67706c94eedd1ea7c5b0125502a9bbd3ee5043489ad

    SHA512

    faaaa8c11beaa8221609bc684d77f6c8230c1129bcafd5f72a99675ca6d2db1ebe24bfeeac256e75300cbafb5f61a8809e72e85c0416b9d73ac0e253520d780a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    5a46b770850723d2572eef7dc6966b0c

    SHA1

    bbb36c933015d42c3792289214d0ef7f068bec3e

    SHA256

    5bc7f811fe6d9061773bb020a57a8344730e93dec25b918662a4dcb112ba472a

    SHA512

    6c9daded4759579ba08b9b9847d4d3290e7d8f2591752fb4b4cb19c7d38c12fd55916c30a6ae583bb7fa91d3bf6f3b854c2434aef6bb8418910c1c47890b11a5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2P314ZXV\login[3].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\CabEC25.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarEEB7.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    206KB

    MD5

    57e1b60cce6d067a7d0f7a379e68ae54

    SHA1

    a9e8e0b730b847cfb84308aff1be84e88f7ce8c1

    SHA256

    6f55f67e6e2b4159336d2a98e148b8b02656cd4dffb054fa59495041f63a20aa

    SHA512

    5912ffc43509e236910efd5c34a248954161cfb7c1b07b4a1d0beebac0896a92ded4af00d1a6332932731775ae39a98673cce12fa090bcc627a46c2d0921ab81

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    206KB

    MD5

    57e1b60cce6d067a7d0f7a379e68ae54

    SHA1

    a9e8e0b730b847cfb84308aff1be84e88f7ce8c1

    SHA256

    6f55f67e6e2b4159336d2a98e148b8b02656cd4dffb054fa59495041f63a20aa

    SHA512

    5912ffc43509e236910efd5c34a248954161cfb7c1b07b4a1d0beebac0896a92ded4af00d1a6332932731775ae39a98673cce12fa090bcc627a46c2d0921ab81

  • C:\Windows\apppatch\svchost.exe

    Filesize

    206KB

    MD5

    57e1b60cce6d067a7d0f7a379e68ae54

    SHA1

    a9e8e0b730b847cfb84308aff1be84e88f7ce8c1

    SHA256

    6f55f67e6e2b4159336d2a98e148b8b02656cd4dffb054fa59495041f63a20aa

    SHA512

    5912ffc43509e236910efd5c34a248954161cfb7c1b07b4a1d0beebac0896a92ded4af00d1a6332932731775ae39a98673cce12fa090bcc627a46c2d0921ab81

  • \Windows\AppPatch\svchost.exe

    Filesize

    206KB

    MD5

    57e1b60cce6d067a7d0f7a379e68ae54

    SHA1

    a9e8e0b730b847cfb84308aff1be84e88f7ce8c1

    SHA256

    6f55f67e6e2b4159336d2a98e148b8b02656cd4dffb054fa59495041f63a20aa

    SHA512

    5912ffc43509e236910efd5c34a248954161cfb7c1b07b4a1d0beebac0896a92ded4af00d1a6332932731775ae39a98673cce12fa090bcc627a46c2d0921ab81

  • \Windows\AppPatch\svchost.exe

    Filesize

    206KB

    MD5

    57e1b60cce6d067a7d0f7a379e68ae54

    SHA1

    a9e8e0b730b847cfb84308aff1be84e88f7ce8c1

    SHA256

    6f55f67e6e2b4159336d2a98e148b8b02656cd4dffb054fa59495041f63a20aa

    SHA512

    5912ffc43509e236910efd5c34a248954161cfb7c1b07b4a1d0beebac0896a92ded4af00d1a6332932731775ae39a98673cce12fa090bcc627a46c2d0921ab81

  • memory/1052-18-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1052-16-0x0000000000230000-0x000000000027F000-memory.dmp

    Filesize

    316KB

  • memory/1052-0-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1052-2-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1052-1-0x0000000000230000-0x000000000027F000-memory.dmp

    Filesize

    316KB

  • memory/2080-59-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-83-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-48-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-49-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-50-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-51-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-52-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-53-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-55-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-56-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-57-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-46-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-58-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-60-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-63-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-64-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-65-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-66-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-67-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-68-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-76-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-45-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-78-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-79-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-80-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-81-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-82-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-47-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-84-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-85-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-87-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-86-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-89-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-91-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-44-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-212-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2080-215-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-43-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-42-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-41-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-40-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-39-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-38-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-36-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-34-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-32-0x0000000002490000-0x0000000002542000-memory.dmp

    Filesize

    712KB

  • memory/2080-30-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/2080-28-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/2080-26-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/2080-24-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/2080-22-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/2080-20-0x00000000004A0000-0x0000000000544000-memory.dmp

    Filesize

    656KB

  • memory/2080-19-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2080-17-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB