Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
0af220cda97fd59612ef2fd9d66807a0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0af220cda97fd59612ef2fd9d66807a0.exe
Resource
win10v2004-20231215-en
General
-
Target
0af220cda97fd59612ef2fd9d66807a0.exe
-
Size
11.5MB
-
MD5
0af220cda97fd59612ef2fd9d66807a0
-
SHA1
43701d2d5005e29bece43c006569925ee418f21a
-
SHA256
19882daeac9da32308cd3340417db32d07bad3b023c78da4eacca0b948d17827
-
SHA512
da9648742532a61e07177423c3423c6de6494ed1db2e045e8f76b3886c5a6207fee7576f643eca6b559ff2c78a5e3f401961afb0782b88de40cb842332dfb629
-
SSDEEP
49152:FVwj1RzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzT:bM1
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2548 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2640 ykrlqwjr.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3000 sc.exe 1376 sc.exe 2544 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2884 1672 0af220cda97fd59612ef2fd9d66807a0.exe 28 PID 1672 wrote to memory of 2884 1672 0af220cda97fd59612ef2fd9d66807a0.exe 28 PID 1672 wrote to memory of 2884 1672 0af220cda97fd59612ef2fd9d66807a0.exe 28 PID 1672 wrote to memory of 2884 1672 0af220cda97fd59612ef2fd9d66807a0.exe 28 PID 1672 wrote to memory of 2192 1672 0af220cda97fd59612ef2fd9d66807a0.exe 31 PID 1672 wrote to memory of 2192 1672 0af220cda97fd59612ef2fd9d66807a0.exe 31 PID 1672 wrote to memory of 2192 1672 0af220cda97fd59612ef2fd9d66807a0.exe 31 PID 1672 wrote to memory of 2192 1672 0af220cda97fd59612ef2fd9d66807a0.exe 31 PID 1672 wrote to memory of 3000 1672 0af220cda97fd59612ef2fd9d66807a0.exe 32 PID 1672 wrote to memory of 3000 1672 0af220cda97fd59612ef2fd9d66807a0.exe 32 PID 1672 wrote to memory of 3000 1672 0af220cda97fd59612ef2fd9d66807a0.exe 32 PID 1672 wrote to memory of 3000 1672 0af220cda97fd59612ef2fd9d66807a0.exe 32 PID 1672 wrote to memory of 1376 1672 0af220cda97fd59612ef2fd9d66807a0.exe 35 PID 1672 wrote to memory of 1376 1672 0af220cda97fd59612ef2fd9d66807a0.exe 35 PID 1672 wrote to memory of 1376 1672 0af220cda97fd59612ef2fd9d66807a0.exe 35 PID 1672 wrote to memory of 1376 1672 0af220cda97fd59612ef2fd9d66807a0.exe 35 PID 1672 wrote to memory of 2544 1672 0af220cda97fd59612ef2fd9d66807a0.exe 37 PID 1672 wrote to memory of 2544 1672 0af220cda97fd59612ef2fd9d66807a0.exe 37 PID 1672 wrote to memory of 2544 1672 0af220cda97fd59612ef2fd9d66807a0.exe 37 PID 1672 wrote to memory of 2544 1672 0af220cda97fd59612ef2fd9d66807a0.exe 37 PID 1672 wrote to memory of 2548 1672 0af220cda97fd59612ef2fd9d66807a0.exe 39 PID 1672 wrote to memory of 2548 1672 0af220cda97fd59612ef2fd9d66807a0.exe 39 PID 1672 wrote to memory of 2548 1672 0af220cda97fd59612ef2fd9d66807a0.exe 39 PID 1672 wrote to memory of 2548 1672 0af220cda97fd59612ef2fd9d66807a0.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\0af220cda97fd59612ef2fd9d66807a0.exe"C:\Users\Admin\AppData\Local\Temp\0af220cda97fd59612ef2fd9d66807a0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tvglwgor\2⤵PID:2884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ykrlqwjr.exe" C:\Windows\SysWOW64\tvglwgor\2⤵PID:2192
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tvglwgor binPath= "C:\Windows\SysWOW64\tvglwgor\ykrlqwjr.exe /d\"C:\Users\Admin\AppData\Local\Temp\0af220cda97fd59612ef2fd9d66807a0.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3000
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tvglwgor "wifi internet conection"2⤵
- Launches sc.exe
PID:1376
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tvglwgor2⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2548
-
-
C:\Windows\SysWOW64\tvglwgor\ykrlqwjr.exeC:\Windows\SysWOW64\tvglwgor\ykrlqwjr.exe /d"C:\Users\Admin\AppData\Local\Temp\0af220cda97fd59612ef2fd9d66807a0.exe"1⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a199a2da877323b524c278dbdd3b784c
SHA191309e7ed554827dc700de329e4298145b223cb8
SHA2565ee66c15c37ef5052471c96652d8aa9a6e61a9d38d0f8823a9835be4d9f3429b
SHA51273bedb6a26f8839631f32a796b78d7c550d27b647807ac7024884afe7bc700c2ce50f716644e95fce5f032bff84401b9091b7b607bf210722c4fb1ac07d9cc68
-
Filesize
877KB
MD5019a987b6177925d9b5b29d60bc6d85c
SHA182128465d62fd36fcb8799c931b9c2ed48254728
SHA256646373c74563c30d63854fac4615e5467d436eb0037e2c47b1cf094f735a6187
SHA512c3f178464062d671ceeb9a5f31f6db1eaa315c7725242015e270fd581ae38c2f365bb5eee8fcc54aacafbd7eac3ecbf6834ff82683d44edbbbea2cc87c4419e7