Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    4s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2023, 18:40

General

  • Target

    Dayload_V8.exe

  • Size

    1.7MB

  • MD5

    2e377d5dd89e8db32b18d7dbf1797b09

  • SHA1

    b30a259fa9fdbdd6fcd6cb21b6d52c7c25e4a978

  • SHA256

    a0d005522770b6dae72fc3f8e80a958d7d209b35c9504c1dfd4c749396bc41bb

  • SHA512

    71d06a530f72c5f6c3fd5af5f12edd8af478c05343581a6cfbec63e32cb4ad2a583639313fdb2fa324385bb0de5dbe0c2bc7f6ee0c6b8f5e14f5621ed5058fa7

  • SSDEEP

    49152:p/jwLjLXC45bdXzX3jTDYjg+ZMF+HYmTYF:pjwXHNjTAgNQY+YF

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 4 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:464
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        2⤵
          PID:1260
        • C:\Windows\System32\spoolsv.exe
          C:\Windows\System32\spoolsv.exe
          2⤵
            PID:280
          • C:\Windows\system32\sppsvc.exe
            C:\Windows\system32\sppsvc.exe
            2⤵
              PID:1340
          • C:\Windows\system32\lsass.exe
            C:\Windows\system32\lsass.exe
            1⤵
              PID:480
            • C:\Windows\system32\wininit.exe
              wininit.exe
              1⤵
                PID:372
                • C:\Windows\system32\lsm.exe
                  C:\Windows\system32\lsm.exe
                  2⤵
                    PID:488
                • C:\Windows\system32\csrss.exe
                  %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                  1⤵
                    PID:336
                  • C:\Windows\System32\smss.exe
                    \SystemRoot\System32\smss.exe
                    1⤵
                      PID:260
                    • C:\Windows\Explorer.EXE
                      C:\Windows\Explorer.EXE
                      1⤵
                      • Loads dropped DLL
                      PID:1404
                      • C:\Users\Admin\AppData\Local\Temp\Dayload_V8.exe
                        "C:\Users\Admin\AppData\Local\Temp\Dayload_V8.exe"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1080
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B07B.tmp\B07C.tmp\B07D.bat C:\Users\Admin\AppData\Local\Temp\Dayload_V8.exe"
                          3⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:1396
                          • C:\Users\Admin\Desktop\Dayload.exe
                            Dayload.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of WriteProcessMemory
                            PID:2296
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c taskkill /f /im procexp.exe > nul 2>&1
                              5⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2688
                              • C:\Windows\system32\taskkill.exe
                                taskkill /f /im procexp.exe
                                6⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2572
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c taskkill /f /im procexp64.exe > nul 2>&1
                              5⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2676
                              • C:\Windows\system32\taskkill.exe
                                taskkill /f /im procexp64.exe
                                6⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2612
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe > nul 2>&1
                              5⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2460
                              • C:\Windows\system32\taskkill.exe
                                taskkill /f /im ProcessHacker.exe
                                6⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2576
                          • C:\Users\Admin\Desktop\ProcessTerminator.exe
                            ProcessTerminator.exe
                            4⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2112
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\UninstallCompress.vssx
                        2⤵
                        • Modifies registry class
                        PID:2196
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\UninstallCompress.vssx
                        2⤵
                        • Modifies registry class
                        PID:2236
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe > nul 2>&1
                      1⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2548
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im taskmgr.exe
                        2⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2568
                    • C:\Windows\system32\wbem\wmiprvse.exe
                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      1⤵
                        PID:2712
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                        1⤵
                          PID:2448

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\B07B.tmp\B07C.tmp\B07D.bat

                          Filesize

                          57B

                          MD5

                          e4e6cc2e53e248bd6d40cc32bf8f329b

                          SHA1

                          d51b57272521a1dbcbf70c9ed27e6f7bba87810e

                          SHA256

                          fbd2f578330e63666a46f0d2a5426d6550a8071902ffc3a9c4e13ed8f0a9a428

                          SHA512

                          e405776685de9cf23a8263685dca8e42b6cbe79cb8e73a136ece6407bbc59c24e38445f0575417467a3a06c1a1e2043caeea941f7e47bf5bb1d859fad9a791ef

                        • C:\Users\Admin\Desktop\CoolFunctions.dll

                          Filesize

                          67KB

                          MD5

                          8322be3a6bb09b1ddf65bf218ee6e343

                          SHA1

                          1422e47f8bc8b88f3dda4be8ecc85fd941d7dc14

                          SHA256

                          0f28971429a8f4ac51608b6069f837ea0c9ca6322e9c809298ed35f3c6ad4a03

                          SHA512

                          b4fcb1747d38b08753209e14f691f8c03de429ba35c4f81282f1bf2298b5d7e62595b629058d23b1a58ed75fc9cc8c42371394d756bd8337deb58b393b8cf509

                        • C:\Users\Admin\Desktop\Dayload.exe

                          Filesize

                          122KB

                          MD5

                          14ae7cc3a92b15ee2f7fcb6e844153ff

                          SHA1

                          0fed2b8182efd39f1e86eddec10392af61d14e27

                          SHA256

                          3a5f54f6d6c5e1e5577fd15be16d9e5dfb95ff4b3323ee21a8f47c684089933a

                          SHA512

                          087121e9f8698acfe5f11a63762defd28975856cab575cb50d652d4b673e1a4902c71978d11919598ceabfeec929a1a739e96eb8706b9c91b158a9954f289138

                        • C:\Users\Admin\Desktop\MSVCP140D.dll

                          Filesize

                          898KB

                          MD5

                          f83746b98014aa2374a79758dafdf409

                          SHA1

                          0520b6ec402963b015ae060b225f30d41a88ab05

                          SHA256

                          e1118fc5ca6a4bcfca0dcbf7b4705bbea6b7155fd58442dc870a61a866bb413d

                          SHA512

                          ee0604705c92a2b605986a2263c4d342fcfe8b002c0fcf634d5a52d811e5b2d00cef80f579c0d44e291ea15a3048bf384fe0dba9222160c736987c90b7c5edff

                        • C:\Users\Admin\Desktop\ProcessTerminator.exe

                          Filesize

                          28KB

                          MD5

                          024ec42976c33828a8c4a55560634118

                          SHA1

                          4a11f5e4331228d3d0270b11aa36010654659268

                          SHA256

                          5946c15a59a5e9f811dec8a81f0b15551fbed38aeda1aa9f0f369edb4570c0fe

                          SHA512

                          e7f8c5d5669bff1da338c4c394ad2022475154068592c1c13eb0785a9541340ec8fa78632c0baf990e0c335cb769771660c438fc8d71072e1e55058ab9499353

                        • C:\Users\Admin\Desktop\ProcessTerminator.exe

                          Filesize

                          28KB

                          MD5

                          024ec42976c33828a8c4a55560634118

                          SHA1

                          4a11f5e4331228d3d0270b11aa36010654659268

                          SHA256

                          5946c15a59a5e9f811dec8a81f0b15551fbed38aeda1aa9f0f369edb4570c0fe

                          SHA512

                          e7f8c5d5669bff1da338c4c394ad2022475154068592c1c13eb0785a9541340ec8fa78632c0baf990e0c335cb769771660c438fc8d71072e1e55058ab9499353

                        • C:\Users\Admin\Desktop\VCRUNTIME140D.dll

                          Filesize

                          171KB

                          MD5

                          6d47ca15e34ce5b3cd1a436226885aaa

                          SHA1

                          33825aec7b88b94ff2926ae367375fc814071b01

                          SHA256

                          f31a44b466c4b6a11f104fd75c221bed775f8db2a6bb2a0d48409fa906a10e9e

                          SHA512

                          587b467c052fe2cf7a6a59cd813b984f89510d68a6b8510497478bdd176e3d7d796e81acd13fb1ff52fa5a0bb0ac804c7a87bed01883252b1bfde0a4e5221426

                        • C:\Users\Admin\Desktop\VCRUNTIME140_1D.dll

                          Filesize

                          62KB

                          MD5

                          aa51acf42986f844d36e4e7807f13239

                          SHA1

                          6284203a35fe0459204fc67d1cc4ec6b329a4ed0

                          SHA256

                          41dd9842b8ba31009ee80c0b382dc2136923d6077767b5fe35dfacce0634c5bc

                          SHA512

                          b724fac28a36b005c4a21dee9fd181bb85eced1c03903cbd81f04822f4adcd95042db7c58ba6e7c92c901f6a33c902ecd9dbeaec4c08c6a7ffd9e2ad57bc5e71

                        • C:\Users\Admin\Desktop\ucrtbased.dll

                          Filesize

                          2.1MB

                          MD5

                          e628baf3be74ffe67e71a27ca3865156

                          SHA1

                          05b75dee03400aea8812b9342e764e909667ebbd

                          SHA256

                          b9921954681ceb3f01a03071f87aaa33116e0ab0a1532309dced36a0085471b7

                          SHA512

                          d5e1a61bb98e35a996cf1d465bc6b922a0aac7d35713852dac43ec54cd34240dcf31d1843c4eed45c251dcde44399b7af1e0262c140577f148b3b706669cfd8e

                        • \Users\Admin\Desktop\Dayload.exe

                          Filesize

                          122KB

                          MD5

                          14ae7cc3a92b15ee2f7fcb6e844153ff

                          SHA1

                          0fed2b8182efd39f1e86eddec10392af61d14e27

                          SHA256

                          3a5f54f6d6c5e1e5577fd15be16d9e5dfb95ff4b3323ee21a8f47c684089933a

                          SHA512

                          087121e9f8698acfe5f11a63762defd28975856cab575cb50d652d4b673e1a4902c71978d11919598ceabfeec929a1a739e96eb8706b9c91b158a9954f289138

                        • \Users\Admin\Desktop\Dayload.exe

                          Filesize

                          122KB

                          MD5

                          14ae7cc3a92b15ee2f7fcb6e844153ff

                          SHA1

                          0fed2b8182efd39f1e86eddec10392af61d14e27

                          SHA256

                          3a5f54f6d6c5e1e5577fd15be16d9e5dfb95ff4b3323ee21a8f47c684089933a

                          SHA512

                          087121e9f8698acfe5f11a63762defd28975856cab575cb50d652d4b673e1a4902c71978d11919598ceabfeec929a1a739e96eb8706b9c91b158a9954f289138

                        • \Users\Admin\Desktop\Dayload.exe

                          Filesize

                          122KB

                          MD5

                          14ae7cc3a92b15ee2f7fcb6e844153ff

                          SHA1

                          0fed2b8182efd39f1e86eddec10392af61d14e27

                          SHA256

                          3a5f54f6d6c5e1e5577fd15be16d9e5dfb95ff4b3323ee21a8f47c684089933a

                          SHA512

                          087121e9f8698acfe5f11a63762defd28975856cab575cb50d652d4b673e1a4902c71978d11919598ceabfeec929a1a739e96eb8706b9c91b158a9954f289138

                        • \Users\Admin\Desktop\Dayload.exe

                          Filesize

                          122KB

                          MD5

                          14ae7cc3a92b15ee2f7fcb6e844153ff

                          SHA1

                          0fed2b8182efd39f1e86eddec10392af61d14e27

                          SHA256

                          3a5f54f6d6c5e1e5577fd15be16d9e5dfb95ff4b3323ee21a8f47c684089933a

                          SHA512

                          087121e9f8698acfe5f11a63762defd28975856cab575cb50d652d4b673e1a4902c71978d11919598ceabfeec929a1a739e96eb8706b9c91b158a9954f289138

                        • \Users\Admin\Desktop\Dayload.exe

                          Filesize

                          122KB

                          MD5

                          14ae7cc3a92b15ee2f7fcb6e844153ff

                          SHA1

                          0fed2b8182efd39f1e86eddec10392af61d14e27

                          SHA256

                          3a5f54f6d6c5e1e5577fd15be16d9e5dfb95ff4b3323ee21a8f47c684089933a

                          SHA512

                          087121e9f8698acfe5f11a63762defd28975856cab575cb50d652d4b673e1a4902c71978d11919598ceabfeec929a1a739e96eb8706b9c91b158a9954f289138

                        • \Users\Admin\Desktop\Dayload.exe

                          Filesize

                          122KB

                          MD5

                          14ae7cc3a92b15ee2f7fcb6e844153ff

                          SHA1

                          0fed2b8182efd39f1e86eddec10392af61d14e27

                          SHA256

                          3a5f54f6d6c5e1e5577fd15be16d9e5dfb95ff4b3323ee21a8f47c684089933a

                          SHA512

                          087121e9f8698acfe5f11a63762defd28975856cab575cb50d652d4b673e1a4902c71978d11919598ceabfeec929a1a739e96eb8706b9c91b158a9954f289138

                        • \Users\Admin\Desktop\Dayload.exe

                          Filesize

                          122KB

                          MD5

                          14ae7cc3a92b15ee2f7fcb6e844153ff

                          SHA1

                          0fed2b8182efd39f1e86eddec10392af61d14e27

                          SHA256

                          3a5f54f6d6c5e1e5577fd15be16d9e5dfb95ff4b3323ee21a8f47c684089933a

                          SHA512

                          087121e9f8698acfe5f11a63762defd28975856cab575cb50d652d4b673e1a4902c71978d11919598ceabfeec929a1a739e96eb8706b9c91b158a9954f289138

                        • \Users\Admin\Desktop\ProcessTerminator.exe

                          Filesize

                          28KB

                          MD5

                          024ec42976c33828a8c4a55560634118

                          SHA1

                          4a11f5e4331228d3d0270b11aa36010654659268

                          SHA256

                          5946c15a59a5e9f811dec8a81f0b15551fbed38aeda1aa9f0f369edb4570c0fe

                          SHA512

                          e7f8c5d5669bff1da338c4c394ad2022475154068592c1c13eb0785a9541340ec8fa78632c0baf990e0c335cb769771660c438fc8d71072e1e55058ab9499353

                        • \Users\Admin\Desktop\ProcessTerminator.exe

                          Filesize

                          28KB

                          MD5

                          024ec42976c33828a8c4a55560634118

                          SHA1

                          4a11f5e4331228d3d0270b11aa36010654659268

                          SHA256

                          5946c15a59a5e9f811dec8a81f0b15551fbed38aeda1aa9f0f369edb4570c0fe

                          SHA512

                          e7f8c5d5669bff1da338c4c394ad2022475154068592c1c13eb0785a9541340ec8fa78632c0baf990e0c335cb769771660c438fc8d71072e1e55058ab9499353

                        • \Users\Admin\Desktop\ProcessTerminator.exe

                          Filesize

                          28KB

                          MD5

                          024ec42976c33828a8c4a55560634118

                          SHA1

                          4a11f5e4331228d3d0270b11aa36010654659268

                          SHA256

                          5946c15a59a5e9f811dec8a81f0b15551fbed38aeda1aa9f0f369edb4570c0fe

                          SHA512

                          e7f8c5d5669bff1da338c4c394ad2022475154068592c1c13eb0785a9541340ec8fa78632c0baf990e0c335cb769771660c438fc8d71072e1e55058ab9499353

                        • \Users\Admin\Desktop\ProcessTerminator.exe

                          Filesize

                          28KB

                          MD5

                          024ec42976c33828a8c4a55560634118

                          SHA1

                          4a11f5e4331228d3d0270b11aa36010654659268

                          SHA256

                          5946c15a59a5e9f811dec8a81f0b15551fbed38aeda1aa9f0f369edb4570c0fe

                          SHA512

                          e7f8c5d5669bff1da338c4c394ad2022475154068592c1c13eb0785a9541340ec8fa78632c0baf990e0c335cb769771660c438fc8d71072e1e55058ab9499353

                        • \Users\Admin\Desktop\msvcp140d.dll

                          Filesize

                          898KB

                          MD5

                          f83746b98014aa2374a79758dafdf409

                          SHA1

                          0520b6ec402963b015ae060b225f30d41a88ab05

                          SHA256

                          e1118fc5ca6a4bcfca0dcbf7b4705bbea6b7155fd58442dc870a61a866bb413d

                          SHA512

                          ee0604705c92a2b605986a2263c4d342fcfe8b002c0fcf634d5a52d811e5b2d00cef80f579c0d44e291ea15a3048bf384fe0dba9222160c736987c90b7c5edff

                        • \Users\Admin\Desktop\ucrtbased.dll

                          Filesize

                          2.1MB

                          MD5

                          e628baf3be74ffe67e71a27ca3865156

                          SHA1

                          05b75dee03400aea8812b9342e764e909667ebbd

                          SHA256

                          b9921954681ceb3f01a03071f87aaa33116e0ab0a1532309dced36a0085471b7

                          SHA512

                          d5e1a61bb98e35a996cf1d465bc6b922a0aac7d35713852dac43ec54cd34240dcf31d1843c4eed45c251dcde44399b7af1e0262c140577f148b3b706669cfd8e

                        • \Users\Admin\Desktop\vcruntime140_1d.dll

                          Filesize

                          62KB

                          MD5

                          aa51acf42986f844d36e4e7807f13239

                          SHA1

                          6284203a35fe0459204fc67d1cc4ec6b329a4ed0

                          SHA256

                          41dd9842b8ba31009ee80c0b382dc2136923d6077767b5fe35dfacce0634c5bc

                          SHA512

                          b724fac28a36b005c4a21dee9fd181bb85eced1c03903cbd81f04822f4adcd95042db7c58ba6e7c92c901f6a33c902ecd9dbeaec4c08c6a7ffd9e2ad57bc5e71

                        • \Users\Admin\Desktop\vcruntime140d.dll

                          Filesize

                          171KB

                          MD5

                          6d47ca15e34ce5b3cd1a436226885aaa

                          SHA1

                          33825aec7b88b94ff2926ae367375fc814071b01

                          SHA256

                          f31a44b466c4b6a11f104fd75c221bed775f8db2a6bb2a0d48409fa906a10e9e

                          SHA512

                          587b467c052fe2cf7a6a59cd813b984f89510d68a6b8510497478bdd176e3d7d796e81acd13fb1ff52fa5a0bb0ac804c7a87bed01883252b1bfde0a4e5221426

                        • memory/1080-0-0x0000000000400000-0x00000000005C6000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/1080-28-0x0000000000400000-0x00000000005C6000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/1396-51-0x000000013F9A0000-0x000000013F9D5000-memory.dmp

                          Filesize

                          212KB

                        • memory/1396-26-0x000000013F9A0000-0x000000013F9D5000-memory.dmp

                          Filesize

                          212KB

                        • memory/2112-39-0x000000013F430000-0x000000013F43C000-memory.dmp

                          Filesize

                          48KB

                        • memory/2112-47-0x000000001BEF0000-0x000000001BF70000-memory.dmp

                          Filesize

                          512KB

                        • memory/2112-41-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/2112-42-0x0000000000570000-0x0000000000588000-memory.dmp

                          Filesize

                          96KB

                        • memory/2112-53-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/2112-54-0x000000001BEF0000-0x000000001BF70000-memory.dmp

                          Filesize

                          512KB

                        • memory/2236-55-0x00000000FF2A0000-0x00000000FF2AF000-memory.dmp

                          Filesize

                          60KB

                        • memory/2296-29-0x000000013F9A0000-0x000000013F9D5000-memory.dmp

                          Filesize

                          212KB

                        • memory/2296-52-0x000000013F9A0000-0x000000013F9D5000-memory.dmp

                          Filesize

                          212KB