Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
106162a9e72052611f27b255db7a5d53.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
106162a9e72052611f27b255db7a5d53.exe
Resource
win10v2004-20231215-en
General
-
Target
106162a9e72052611f27b255db7a5d53.exe
-
Size
10.7MB
-
MD5
106162a9e72052611f27b255db7a5d53
-
SHA1
b2c8f9a1c6cd769bdad4d45b3e340b28e0bb2092
-
SHA256
0bd0d596230aa3958d9f54bd43d3de94685dd9f7ed3e8bd0b5c1a01d48d7e34e
-
SHA512
0b5966e406ba6c3d861e5b982a539a51c836a8fb08fd1c9295f17c108d29ae72ad687689eadb9fe3540924afab949598dd6f2108f7498d79edffa2a93a7b9ec9
-
SSDEEP
49152:3nHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:3
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\cyuenvsv = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2796 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\cyuenvsv\ImagePath = "C:\\Windows\\SysWOW64\\cyuenvsv\\vvwekfht.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2068 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 vvwekfht.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2540 set thread context of 2068 2540 vvwekfht.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2784 sc.exe 2812 sc.exe 2828 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2680 1728 106162a9e72052611f27b255db7a5d53.exe 28 PID 1728 wrote to memory of 2680 1728 106162a9e72052611f27b255db7a5d53.exe 28 PID 1728 wrote to memory of 2680 1728 106162a9e72052611f27b255db7a5d53.exe 28 PID 1728 wrote to memory of 2680 1728 106162a9e72052611f27b255db7a5d53.exe 28 PID 1728 wrote to memory of 2688 1728 106162a9e72052611f27b255db7a5d53.exe 30 PID 1728 wrote to memory of 2688 1728 106162a9e72052611f27b255db7a5d53.exe 30 PID 1728 wrote to memory of 2688 1728 106162a9e72052611f27b255db7a5d53.exe 30 PID 1728 wrote to memory of 2688 1728 106162a9e72052611f27b255db7a5d53.exe 30 PID 1728 wrote to memory of 2784 1728 106162a9e72052611f27b255db7a5d53.exe 32 PID 1728 wrote to memory of 2784 1728 106162a9e72052611f27b255db7a5d53.exe 32 PID 1728 wrote to memory of 2784 1728 106162a9e72052611f27b255db7a5d53.exe 32 PID 1728 wrote to memory of 2784 1728 106162a9e72052611f27b255db7a5d53.exe 32 PID 1728 wrote to memory of 2812 1728 106162a9e72052611f27b255db7a5d53.exe 34 PID 1728 wrote to memory of 2812 1728 106162a9e72052611f27b255db7a5d53.exe 34 PID 1728 wrote to memory of 2812 1728 106162a9e72052611f27b255db7a5d53.exe 34 PID 1728 wrote to memory of 2812 1728 106162a9e72052611f27b255db7a5d53.exe 34 PID 1728 wrote to memory of 2828 1728 106162a9e72052611f27b255db7a5d53.exe 36 PID 1728 wrote to memory of 2828 1728 106162a9e72052611f27b255db7a5d53.exe 36 PID 1728 wrote to memory of 2828 1728 106162a9e72052611f27b255db7a5d53.exe 36 PID 1728 wrote to memory of 2828 1728 106162a9e72052611f27b255db7a5d53.exe 36 PID 1728 wrote to memory of 2796 1728 106162a9e72052611f27b255db7a5d53.exe 38 PID 1728 wrote to memory of 2796 1728 106162a9e72052611f27b255db7a5d53.exe 38 PID 1728 wrote to memory of 2796 1728 106162a9e72052611f27b255db7a5d53.exe 38 PID 1728 wrote to memory of 2796 1728 106162a9e72052611f27b255db7a5d53.exe 38 PID 2540 wrote to memory of 2068 2540 vvwekfht.exe 41 PID 2540 wrote to memory of 2068 2540 vvwekfht.exe 41 PID 2540 wrote to memory of 2068 2540 vvwekfht.exe 41 PID 2540 wrote to memory of 2068 2540 vvwekfht.exe 41 PID 2540 wrote to memory of 2068 2540 vvwekfht.exe 41 PID 2540 wrote to memory of 2068 2540 vvwekfht.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\106162a9e72052611f27b255db7a5d53.exe"C:\Users\Admin\AppData\Local\Temp\106162a9e72052611f27b255db7a5d53.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cyuenvsv\2⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vvwekfht.exe" C:\Windows\SysWOW64\cyuenvsv\2⤵PID:2688
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create cyuenvsv binPath= "C:\Windows\SysWOW64\cyuenvsv\vvwekfht.exe /d\"C:\Users\Admin\AppData\Local\Temp\106162a9e72052611f27b255db7a5d53.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2784
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description cyuenvsv "wifi internet conection"2⤵
- Launches sc.exe
PID:2812
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start cyuenvsv2⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2796
-
-
C:\Windows\SysWOW64\cyuenvsv\vvwekfht.exeC:\Windows\SysWOW64\cyuenvsv\vvwekfht.exe /d"C:\Users\Admin\AppData\Local\Temp\106162a9e72052611f27b255db7a5d53.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD5b8e797913e6a9619746b1a94d215124d
SHA16102d4a92d472708b6460a056a91d74c6b0032b8
SHA256c9b40eeff470f9f265a52f5c4fe5790060f04b1b5b54c49728da02d0bf2ddf21
SHA5122ac04353197e60f9f7ecdb0afc8b34d4ef44c92e7155a7695fd0435806304aa99e463d91409d9ce8752f11561da15fd97ef35ac0204a04c005b06d0ab1edd071