Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
1ed4eeb70731aef3ad7894eae2a31596.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ed4eeb70731aef3ad7894eae2a31596.exe
Resource
win10v2004-20231215-en
General
-
Target
1ed4eeb70731aef3ad7894eae2a31596.exe
-
Size
63KB
-
MD5
1ed4eeb70731aef3ad7894eae2a31596
-
SHA1
6b3140c20ef910b73e04ac8c2f46c3fc8d3110c6
-
SHA256
55e14b777f92fa1171264d5bd37b6901fe39b8f1ea21cd0564b2cdc2615a04f1
-
SHA512
deb22e9ce11f93e075cf60f649f2d75ed04c72ad9bf3fa203c439299111f85cb249f110cf9888cdcaaecb80af89acc9ae033cb762bcd92ee343eba9713e2fd77
-
SSDEEP
768:xrpeUKbGP2fSz1A+pCmbZ8veI5Ig2aG+YaOvJ04m+jtRnbcuyD7UsM:xMqz1AGCmbZ8GI5CeOR04mMtRnouy8sM
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sebsbvx\\coiome.exe" mshta.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\sebsbvx 1ed4eeb70731aef3ad7894eae2a31596.exe File created C:\Program Files (x86)\CFG.hta 1ed4eeb70731aef3ad7894eae2a31596.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2816 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2608 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\default_page_url = "http://www.52cailing.com" mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.52cailing.com" mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.52cailing.com" mshta.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 1ed4eeb70731aef3ad7894eae2a31596.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 3068 2224 1ed4eeb70731aef3ad7894eae2a31596.exe 14 PID 2224 wrote to memory of 3068 2224 1ed4eeb70731aef3ad7894eae2a31596.exe 14 PID 2224 wrote to memory of 3068 2224 1ed4eeb70731aef3ad7894eae2a31596.exe 14 PID 2224 wrote to memory of 3068 2224 1ed4eeb70731aef3ad7894eae2a31596.exe 14 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 948 attrib.exe 1324 attrib.exe
Processes
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\CFG.hta"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:3068
-
C:\Users\Admin\AppData\Local\Temp\1ed4eeb70731aef3ad7894eae2a31596.exe"C:\Users\Admin\AppData\Local\Temp\1ed4eeb70731aef3ad7894eae2a31596.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵PID:2100
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- Kills process with taskkill
PID:2608
-
-
-
C:\Program Files (x86)\Common Files\sebsbvx\coiome.exe"C:\Program Files (x86)\Common Files\sebsbvx\coiome.exe"2⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵PID:1640
-
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵PID:1688
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\1ed4eeb70731aef3ad7894eae2a31596.exe"2⤵PID:956
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"1⤵
- Views/modifies file attributes
PID:948
-
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"1⤵
- Views/modifies file attributes
PID:1324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD537c6ddc9cf7affd3dafcdbb12429cf2e
SHA18d9bfc800861a1ae6d8c07525fc49132b1d2a459
SHA2565ea2907c9d053c2566e8fcea9db1040309ddfa5ab1307e9f406eab1a06f5f4f4
SHA512b59a3c62b90392d18030e7251b73be51fb10e739e3cb885c70254d7ee534e4cd42d149f086d0df56162f0920ff0a17820a39c13dde1b76e7b2abc960ec11f30b
-
Filesize
206KB
MD5b2c6a44befccc1f17b7f7c8ff62c206e
SHA16feb43a2af9eda40c5003e10392af8291a02989b
SHA25680b1805073f6cfc20acff6ba621d2a09abad7b7ac9edabd86e09444d877102ee
SHA512a8b72e909fdeea325dbcc8d7df644584c845371655aec7dae3d34ba85ae9e301440f694c6bd8fc833e8e4abc60dc11fc4125f86cb0eb0f006f7dfcd02538f407
-
Filesize
92KB
MD58733b5acaa1f160ed5bc9b26513840a0
SHA1b5377e7aeafef3ee20bc360d49a75f067a18e15b
SHA2565751a64405f593f38a6ba398a2c4c724413adff63d9d0f5d66b482db18e6658f
SHA51243163a19eebabec77ccd2a5f18f1aaf23db1162168ee974afad2fbdbf9caeba67882c6eb2a92175f189e4e15cd825dc04174a267f166e63739a7b33c31261954