Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
1568044c54c2b1e025bde945685ca407.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1568044c54c2b1e025bde945685ca407.exe
Resource
win10v2004-20231222-en
General
-
Target
1568044c54c2b1e025bde945685ca407.exe
-
Size
290KB
-
MD5
1568044c54c2b1e025bde945685ca407
-
SHA1
aa3a140086f8e9b52e7c17e000f90421f2698970
-
SHA256
016424eed02f66ebda644bed14f02781d51398cd883f6a7ae63e8fea76b08e0f
-
SHA512
5a9de32ed0fccb06bab46dce762b60fc1a639b9fca1ce1475c678f685f5d6535127e888ebc905f650627e669503f8e4bba19485a8b0a2166cc47397ae24cec64
-
SSDEEP
6144:BfsUV09Du+Rc9DMQtc9LMojzmx1i68Nbt67pkkDvarldYLx3IhpDV:Bp2C9DGh1wi6AtephDveY13QpD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 288 syag.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 1568044c54c2b1e025bde945685ca407.exe 2228 1568044c54c2b1e025bde945685ca407.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6F76ACC8-CEF3-AD4E-FF1F-3295E8F41188} = "C:\\Users\\Admin\\AppData\\Roaming\\Tabec\\syag.exe" syag.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1248 1900 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Privacy 1568044c54c2b1e025bde945685ca407.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 1568044c54c2b1e025bde945685ca407.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe 288 syag.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2228 1568044c54c2b1e025bde945685ca407.exe Token: SeSecurityPrivilege 2228 1568044c54c2b1e025bde945685ca407.exe Token: SeSecurityPrivilege 2228 1568044c54c2b1e025bde945685ca407.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2228 1568044c54c2b1e025bde945685ca407.exe 288 syag.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2228 wrote to memory of 288 2228 1568044c54c2b1e025bde945685ca407.exe 28 PID 2228 wrote to memory of 288 2228 1568044c54c2b1e025bde945685ca407.exe 28 PID 2228 wrote to memory of 288 2228 1568044c54c2b1e025bde945685ca407.exe 28 PID 2228 wrote to memory of 288 2228 1568044c54c2b1e025bde945685ca407.exe 28 PID 288 wrote to memory of 1084 288 syag.exe 11 PID 288 wrote to memory of 1084 288 syag.exe 11 PID 288 wrote to memory of 1084 288 syag.exe 11 PID 288 wrote to memory of 1084 288 syag.exe 11 PID 288 wrote to memory of 1084 288 syag.exe 11 PID 288 wrote to memory of 1144 288 syag.exe 18 PID 288 wrote to memory of 1144 288 syag.exe 18 PID 288 wrote to memory of 1144 288 syag.exe 18 PID 288 wrote to memory of 1144 288 syag.exe 18 PID 288 wrote to memory of 1144 288 syag.exe 18 PID 288 wrote to memory of 1196 288 syag.exe 12 PID 288 wrote to memory of 1196 288 syag.exe 12 PID 288 wrote to memory of 1196 288 syag.exe 12 PID 288 wrote to memory of 1196 288 syag.exe 12 PID 288 wrote to memory of 1196 288 syag.exe 12 PID 288 wrote to memory of 2480 288 syag.exe 16 PID 288 wrote to memory of 2480 288 syag.exe 16 PID 288 wrote to memory of 2480 288 syag.exe 16 PID 288 wrote to memory of 2480 288 syag.exe 16 PID 288 wrote to memory of 2480 288 syag.exe 16 PID 288 wrote to memory of 2228 288 syag.exe 23 PID 288 wrote to memory of 2228 288 syag.exe 23 PID 288 wrote to memory of 2228 288 syag.exe 23 PID 288 wrote to memory of 2228 288 syag.exe 23 PID 288 wrote to memory of 2228 288 syag.exe 23 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 2228 wrote to memory of 1900 2228 1568044c54c2b1e025bde945685ca407.exe 29 PID 1900 wrote to memory of 1248 1900 cmd.exe 31 PID 1900 wrote to memory of 1248 1900 cmd.exe 31 PID 1900 wrote to memory of 1248 1900 cmd.exe 31 PID 1900 wrote to memory of 1248 1900 cmd.exe 31 PID 288 wrote to memory of 1612 288 syag.exe 30 PID 288 wrote to memory of 1612 288 syag.exe 30 PID 288 wrote to memory of 1612 288 syag.exe 30 PID 288 wrote to memory of 1612 288 syag.exe 30 PID 288 wrote to memory of 1612 288 syag.exe 30 PID 288 wrote to memory of 1248 288 syag.exe 31 PID 288 wrote to memory of 1248 288 syag.exe 31 PID 288 wrote to memory of 1248 288 syag.exe 31 PID 288 wrote to memory of 1248 288 syag.exe 31 PID 288 wrote to memory of 1248 288 syag.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1084
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\1568044c54c2b1e025bde945685ca407.exe"C:\Users\Admin\AppData\Local\Temp\1568044c54c2b1e025bde945685ca407.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\Tabec\syag.exe"C:\Users\Admin\AppData\Roaming\Tabec\syag.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4b095dd4.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 1164⤵
- Program crash
PID:1248
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2480
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1144
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-759560948-13949099431938739070-662912317218288515-1907576775-20270341271796949413"1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366B
MD5798151d2b7154fcd617c86ff8edd7f0b
SHA1392c7dba43c66e4bb5accef79233841e5b5ef287
SHA256cefb26491fed087a3356a2074116a0a509bb0073ce5eb547bdb681c703d990ee
SHA512906610ff2ddc6be445d7c8babc6078d0ed2f8355995f7b570828187eaf4c95817f25f90085b0a68a4f6d640a585160ebe0f58c88cc92829fdd862262493f0929
-
Filesize
181KB
MD575919f7a4e0a92a8b6492835f057ef4e
SHA11d82fd98b983a2f15b95bbe4791f2aa872e078f7
SHA256fee9d68fc188758dcde2728c2409e7e7f322c01f5ce80f54aaec65af25de6535
SHA5121b00046a93514759f1d57c6aaf5776ac24704cba9d4dc9fa9c021f7bfc26201d82150503dec877e628547f0e39b76e385ca1c2f32deb81c3551047b45adb86e0
-
Filesize
149KB
MD51ba8cfa59433e574b3db70f4b4915892
SHA10109f2ae8990b243f6a2decff17655b5ae035fd2
SHA2564b2ffaa633922a126d9def08269049a75b15d0af095340fba256cbe506924c87
SHA51223bbae93895fd117b557ecf15a3c21fd1d544b733f86a38e1f20b644899a3f63a131de9d624c028a441f0dd204a1b057e1892c09bac6e8588d7814acf6beeea6
-
Filesize
111KB
MD5f347ed8dce7d59b7bebc5049761819ae
SHA107944ad3516da5f2c62a097bb337ce3d32a16ff9
SHA256afb17c7eb26c26cb834247182d335bc1f1ad8c43b08ec253fbb2421402b5ef74
SHA5125ed881cc9949a46758a33a5c3e34982c19f6f7b118f22c5db4f59ed7d6b5e6a66e4039f53439eab8b34c87664317c1e9db2bc83e390efe40e9b30a004a48bb19
-
Filesize
124KB
MD5edd1f3c99f90f8bc02209973603ad94e
SHA131a4bf10b827603f0d7fc31143810aa4998cb2b2
SHA256c31b381b0800465881a7ff3f379c709499ef71367bbfb4386f0286ebf483f7a4
SHA5120c320fd000a67c30e15cbf1ea8134f30eb32220fff6a9d11c6fd5c80dcf4661240588c995ed397392e1a8babd184c253a4f40ebba1f2a6b99adc8072268bc366
-
Filesize
123KB
MD5be405efd5d6f2dceefa2e9a3afd300d8
SHA11151a304ac48823176f133ea6295d0f9b51780f2
SHA256a6d7fbf73f3be648619bfb44004f11151a704da93afdad6385d6952a303d2a31
SHA5123b545bbb41ccfbaa1a875f34f41c0687dbf0a1f99afd4e4b099be5bfa021065b28a2667a6c6be06acd04be5e3789a01b478064ddb09ef8117c12cad049a2f7ab