Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
2023 Customer Information Export(1).doc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023 Customer Information Export(1).doc.exe
Resource
win10v2004-20230915-en
General
-
Target
2023 Customer Information Export(1).doc.exe
-
Size
690KB
-
MD5
decf06be9f0c0eed2d93bf190ba4b99b
-
SHA1
e4aa992415440850a9e0a17b2038c066d952bf4f
-
SHA256
4d845e9e862b6cc61cf4909f4c16c2330483ba62d32c977c0080020a841bf3e1
-
SHA512
a00a7ffba5a666d19fdeccf7c8520e1bee55f72bbe6e4802565b131040adfeb5e1590af23d8d066ef2d38b63aeb51ac1bbc203b07c7ccc252b8d78315ece8ec3
-
SSDEEP
12288:s44lO9ZVrJDoPAYzy8DjzzUl1XW9OSJLIF:s44lkl0N2kzzu1XW9OOMF
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZYybOms = "C:\\Users\\Admin\\AppData\\Roaming\\ZYybOms\\ZYybOms.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1864 set thread context of 2696 1864 2023 Customer Information Export(1).doc.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 RegSvcs.exe 2696 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2696 RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2716 1864 2023 Customer Information Export(1).doc.exe 28 PID 1864 wrote to memory of 2716 1864 2023 Customer Information Export(1).doc.exe 28 PID 1864 wrote to memory of 2716 1864 2023 Customer Information Export(1).doc.exe 28 PID 1864 wrote to memory of 2716 1864 2023 Customer Information Export(1).doc.exe 28 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31 PID 1864 wrote to memory of 2696 1864 2023 Customer Information Export(1).doc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023 Customer Information Export(1).doc.exe"C:\Users\Admin\AppData\Local\Temp\2023 Customer Information Export(1).doc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hETSNfSV" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC4C5.tmp"2⤵
- Creates scheduled task(s)
PID:2716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57a4b5ddbc2fde0420c865b316e276959
SHA129a0f9f4ad1dc3291c63c1a022e9a0e290fe9cb3
SHA256358f2b79797d56b37f28df9532b31a6d822365ccdd9c619d98865d72b631af6c
SHA51286f4cf6e53b6e854ee2f4d6a668bb475a37f6fc22295fa30c2356cf0cd635f67b0d4921d4f1efbf216991b6dd7f8f8cd27eaf7c495024c9c692d420dc2f2a1fc