Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
1f9e4dc6ec4af15b7b9a14d393134050.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f9e4dc6ec4af15b7b9a14d393134050.exe
Resource
win10v2004-20231215-en
General
-
Target
1f9e4dc6ec4af15b7b9a14d393134050.exe
-
Size
512KB
-
MD5
1f9e4dc6ec4af15b7b9a14d393134050
-
SHA1
d2aff9f757e4459ab8d708f1fc29cd06d94fca75
-
SHA256
5d54c5f90ab9b99d4c3378095712af25570efe80035f6e9f44f0d5586c2350b9
-
SHA512
007b96bfbb0d120b49b29190678e8cb34debc21b754f3347147d9c788af59b829bc1dcee119f5a22a995ae8aa53a1b91e752faeb2d09d347b37156b22375d577
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5K
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1820 yhoaeyyxcj.exe 2732 jkereeqhuallenp.exe 2840 fevmfsab.exe 2692 xvmjtjhxjddmb.exe -
Loads dropped DLL 4 IoCs
pid Process 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2080-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\xvmjtjhxjddmb.exe 1f9e4dc6ec4af15b7b9a14d393134050.exe File opened for modification C:\Windows\SysWOW64\xvmjtjhxjddmb.exe 1f9e4dc6ec4af15b7b9a14d393134050.exe File created C:\Windows\SysWOW64\yhoaeyyxcj.exe 1f9e4dc6ec4af15b7b9a14d393134050.exe File opened for modification C:\Windows\SysWOW64\yhoaeyyxcj.exe 1f9e4dc6ec4af15b7b9a14d393134050.exe File created C:\Windows\SysWOW64\jkereeqhuallenp.exe 1f9e4dc6ec4af15b7b9a14d393134050.exe File opened for modification C:\Windows\SysWOW64\jkereeqhuallenp.exe 1f9e4dc6ec4af15b7b9a14d393134050.exe File created C:\Windows\SysWOW64\fevmfsab.exe 1f9e4dc6ec4af15b7b9a14d393134050.exe File opened for modification C:\Windows\SysWOW64\fevmfsab.exe 1f9e4dc6ec4af15b7b9a14d393134050.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 1f9e4dc6ec4af15b7b9a14d393134050.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABFFABFF913F2E083753B44819A3999B38A028A4364034CE1CB42EE09D1" 1f9e4dc6ec4af15b7b9a14d393134050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB6B12F449339EF53C8B9D132EDD7C4" 1f9e4dc6ec4af15b7b9a14d393134050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF9FCF8482D851B903CD72D7D9DBCE5E141594367436333D7ED" 1f9e4dc6ec4af15b7b9a14d393134050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78368B1FE6E21D0D27CD1D48A0F9111" 1f9e4dc6ec4af15b7b9a14d393134050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1844C67B1596DBC0B8BC7C95EC9F34BC" 1f9e4dc6ec4af15b7b9a14d393134050.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 1f9e4dc6ec4af15b7b9a14d393134050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32352C0B9C2683276A4277A0772F2DD67DF664AA" 1f9e4dc6ec4af15b7b9a14d393134050.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 1820 yhoaeyyxcj.exe 1820 yhoaeyyxcj.exe 1820 yhoaeyyxcj.exe 2732 jkereeqhuallenp.exe 2732 jkereeqhuallenp.exe 2732 jkereeqhuallenp.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 1820 yhoaeyyxcj.exe 1820 yhoaeyyxcj.exe 1820 yhoaeyyxcj.exe 2732 jkereeqhuallenp.exe 2732 jkereeqhuallenp.exe 2732 jkereeqhuallenp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1820 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 24 PID 2080 wrote to memory of 1820 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 24 PID 2080 wrote to memory of 1820 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 24 PID 2080 wrote to memory of 1820 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 24 PID 2080 wrote to memory of 2732 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 23 PID 2080 wrote to memory of 2732 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 23 PID 2080 wrote to memory of 2732 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 23 PID 2080 wrote to memory of 2732 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 23 PID 2080 wrote to memory of 2840 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 22 PID 2080 wrote to memory of 2840 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 22 PID 2080 wrote to memory of 2840 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 22 PID 2080 wrote to memory of 2840 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 22 PID 2080 wrote to memory of 2692 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 20 PID 2080 wrote to memory of 2692 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 20 PID 2080 wrote to memory of 2692 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 20 PID 2080 wrote to memory of 2692 2080 1f9e4dc6ec4af15b7b9a14d393134050.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f9e4dc6ec4af15b7b9a14d393134050.exe"C:\Users\Admin\AppData\Local\Temp\1f9e4dc6ec4af15b7b9a14d393134050.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵PID:2700
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2492
-
-
-
C:\Windows\SysWOW64\xvmjtjhxjddmb.exexvmjtjhxjddmb.exe2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Windows\SysWOW64\fevmfsab.exefevmfsab.exe2⤵
- Executes dropped EXE
PID:2840
-
-
C:\Windows\SysWOW64\jkereeqhuallenp.exejkereeqhuallenp.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2732
-
-
C:\Windows\SysWOW64\yhoaeyyxcj.exeyhoaeyyxcj.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1820
-
-
C:\Windows\SysWOW64\fevmfsab.exeC:\Windows\system32\fevmfsab.exe1⤵PID:2612