Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
9207d62c7e2a8578f4f34d3322a05d84_JC.exe
Resource
win7-20230831-en
General
-
Target
9207d62c7e2a8578f4f34d3322a05d84_JC.exe
-
Size
315KB
-
MD5
9207d62c7e2a8578f4f34d3322a05d84
-
SHA1
61ae5264a1bdecbf0183503c7003c0fc6081cf3c
-
SHA256
6a0cb915a305440c4c85830c53a10e106dddc94fc36c317ca7d682814ae399d6
-
SHA512
91df21974e94104c1239dc794f4c9bf42c2ffaa0c1e84d4d6221abb9910dc7bddd8f7bb3bd5654b2fb694c045205844d071c64d2791eb208feec435b87fce065
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+Xh:vHW138/iXWlK885rKlGSekcj66cih
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Deletes itself 1 IoCs
pid Process 2756 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2108 jybit.exe 2100 wiynq.exe -
Loads dropped DLL 2 IoCs
pid Process 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 2108 jybit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe 2100 wiynq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2108 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 28 PID 2212 wrote to memory of 2108 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 28 PID 2212 wrote to memory of 2108 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 28 PID 2212 wrote to memory of 2108 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 28 PID 2212 wrote to memory of 2756 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 30 PID 2212 wrote to memory of 2756 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 30 PID 2212 wrote to memory of 2756 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 30 PID 2212 wrote to memory of 2756 2212 9207d62c7e2a8578f4f34d3322a05d84_JC.exe 30 PID 2108 wrote to memory of 2100 2108 jybit.exe 33 PID 2108 wrote to memory of 2100 2108 jybit.exe 33 PID 2108 wrote to memory of 2100 2108 jybit.exe 33 PID 2108 wrote to memory of 2100 2108 jybit.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9207d62c7e2a8578f4f34d3322a05d84_JC.exe"C:\Users\Admin\AppData\Local\Temp\9207d62c7e2a8578f4f34d3322a05d84_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\jybit.exe"C:\Users\Admin\AppData\Local\Temp\jybit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\wiynq.exe"C:\Users\Admin\AppData\Local\Temp\wiynq.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD54f7b4bb52943640bc703f35035b1e215
SHA12fb618d9e165c33ac2dfcfbba46dbcfae2149551
SHA256fb4535d9be207eae08fb992c872f8822421ee44558f37f863944bbb680c00720
SHA5120529e2ccff52768c0bb6a766bb87b79df91b30c1e607b561c1e7d5b5e6609ed8c8d8bd44b42ca4f54db605fc3d1ab5e469fa99cfadb1fc9bdb5b3f435b62f174
-
Filesize
282B
MD54f7b4bb52943640bc703f35035b1e215
SHA12fb618d9e165c33ac2dfcfbba46dbcfae2149551
SHA256fb4535d9be207eae08fb992c872f8822421ee44558f37f863944bbb680c00720
SHA5120529e2ccff52768c0bb6a766bb87b79df91b30c1e607b561c1e7d5b5e6609ed8c8d8bd44b42ca4f54db605fc3d1ab5e469fa99cfadb1fc9bdb5b3f435b62f174
-
Filesize
512B
MD50565ff35ef6de5ab71c2bc1e79593c13
SHA1f7dd31ccd65bf55aacef433ec5d32d0edae857e1
SHA256624ea27fbb855df15661ceb958261a8461e3754696d50d4e4e2961243c2627c3
SHA51244661cb357248a524977eac4ab6926e480f90c84191400e124c08bb49b7ab4beca988911ee27a30d0c37682607af284fefd54c40c0674a150fc30ba45e0ca890
-
Filesize
315KB
MD540d9f2bf99a2e5daf8c0b20fbd4e5106
SHA1aba1a41037be82796f7b9d639007b4a93200a343
SHA2566117b02bec73ed1fc0a631f9c39663ce78be22bb1c5e1581dd807f014d3924a3
SHA512396b3b8ca79d82af412d4adb32a9778cd4f3d101dc595e785939ff2afda70b31fbfac20a905ce987b32ed3d40f8453323303ebaf28b16a1c271859c6adfe735a
-
Filesize
315KB
MD540d9f2bf99a2e5daf8c0b20fbd4e5106
SHA1aba1a41037be82796f7b9d639007b4a93200a343
SHA2566117b02bec73ed1fc0a631f9c39663ce78be22bb1c5e1581dd807f014d3924a3
SHA512396b3b8ca79d82af412d4adb32a9778cd4f3d101dc595e785939ff2afda70b31fbfac20a905ce987b32ed3d40f8453323303ebaf28b16a1c271859c6adfe735a
-
Filesize
172KB
MD5a4652b2546f35d1510ae2feea9ea0aad
SHA167d6f627e31eab2d8cc1b1666dcd860f51710e06
SHA256b66315e2eb7ee4ea48b11c233055fa7c109f4a287d14cc3f9293da5308edbe0d
SHA512b93064cb4ac6902895966f4e2219d3012bc618bcb2e32737cb44c631759ea24b69fc325db25ffa66e0c055e1e57c0a9d7e9ad2cfb2bbf62b4174db268aad62d3
-
Filesize
315KB
MD540d9f2bf99a2e5daf8c0b20fbd4e5106
SHA1aba1a41037be82796f7b9d639007b4a93200a343
SHA2566117b02bec73ed1fc0a631f9c39663ce78be22bb1c5e1581dd807f014d3924a3
SHA512396b3b8ca79d82af412d4adb32a9778cd4f3d101dc595e785939ff2afda70b31fbfac20a905ce987b32ed3d40f8453323303ebaf28b16a1c271859c6adfe735a
-
Filesize
172KB
MD5a4652b2546f35d1510ae2feea9ea0aad
SHA167d6f627e31eab2d8cc1b1666dcd860f51710e06
SHA256b66315e2eb7ee4ea48b11c233055fa7c109f4a287d14cc3f9293da5308edbe0d
SHA512b93064cb4ac6902895966f4e2219d3012bc618bcb2e32737cb44c631759ea24b69fc325db25ffa66e0c055e1e57c0a9d7e9ad2cfb2bbf62b4174db268aad62d3