Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
4f2e6714b75856c79cd760cce8b0e172.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f2e6714b75856c79cd760cce8b0e172.exe
Resource
win10v2004-20231215-en
General
-
Target
4f2e6714b75856c79cd760cce8b0e172.exe
-
Size
993KB
-
MD5
4f2e6714b75856c79cd760cce8b0e172
-
SHA1
8032929bd9a6cc47d37db6165a2e6874bcaa7ed6
-
SHA256
46c41097a12828dfaf4b0f55e61417f76ab8824cfe9502fcfdba7265aa83e04a
-
SHA512
7a583ee2ac3ae2437462bece93367a6c40cacd2072d5945735e720dd9f1b4c12dd84859485d699bc0a97e1a7a99120da807f1e4612de82b99527787d1b7ae906
-
SSDEEP
6144:ce5/c2FEDPWGc6/tSVsdwknSai1nF6L9rtSzJeL/Mo7IFD9CDgQdHhQQA1lIrv+G:SUTct
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 476 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2544 umim.exe 308 umim.exe -
Loads dropped DLL 2 IoCs
pid Process 1136 4f2e6714b75856c79cd760cce8b0e172.exe 1136 4f2e6714b75856c79cd760cce8b0e172.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ziirer = "C:\\Users\\Admin\\AppData\\Roaming\\Osfy\\umim.exe" umim.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2200 set thread context of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2544 set thread context of 308 2544 umim.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 1156 1136 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Privacy cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe 308 umim.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1136 4f2e6714b75856c79cd760cce8b0e172.exe Token: SeSecurityPrivilege 1136 4f2e6714b75856c79cd760cce8b0e172.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2200 4f2e6714b75856c79cd760cce8b0e172.exe 2544 umim.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 2200 wrote to memory of 1136 2200 4f2e6714b75856c79cd760cce8b0e172.exe 28 PID 1136 wrote to memory of 2544 1136 4f2e6714b75856c79cd760cce8b0e172.exe 29 PID 1136 wrote to memory of 2544 1136 4f2e6714b75856c79cd760cce8b0e172.exe 29 PID 1136 wrote to memory of 2544 1136 4f2e6714b75856c79cd760cce8b0e172.exe 29 PID 1136 wrote to memory of 2544 1136 4f2e6714b75856c79cd760cce8b0e172.exe 29 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 2544 wrote to memory of 308 2544 umim.exe 30 PID 308 wrote to memory of 1164 308 umim.exe 13 PID 308 wrote to memory of 1164 308 umim.exe 13 PID 308 wrote to memory of 1164 308 umim.exe 13 PID 308 wrote to memory of 1164 308 umim.exe 13 PID 308 wrote to memory of 1164 308 umim.exe 13 PID 308 wrote to memory of 1272 308 umim.exe 14 PID 308 wrote to memory of 1272 308 umim.exe 14 PID 308 wrote to memory of 1272 308 umim.exe 14 PID 308 wrote to memory of 1272 308 umim.exe 14 PID 308 wrote to memory of 1272 308 umim.exe 14 PID 308 wrote to memory of 1344 308 umim.exe 24 PID 308 wrote to memory of 1344 308 umim.exe 24 PID 308 wrote to memory of 1344 308 umim.exe 24 PID 308 wrote to memory of 1344 308 umim.exe 24 PID 308 wrote to memory of 1344 308 umim.exe 24 PID 308 wrote to memory of 1136 308 umim.exe 28 PID 308 wrote to memory of 1136 308 umim.exe 28 PID 308 wrote to memory of 1136 308 umim.exe 28 PID 308 wrote to memory of 1136 308 umim.exe 28 PID 308 wrote to memory of 1136 308 umim.exe 28 PID 1136 wrote to memory of 476 1136 4f2e6714b75856c79cd760cce8b0e172.exe 31 PID 1136 wrote to memory of 476 1136 4f2e6714b75856c79cd760cce8b0e172.exe 31 PID 1136 wrote to memory of 476 1136 4f2e6714b75856c79cd760cce8b0e172.exe 31 PID 1136 wrote to memory of 476 1136 4f2e6714b75856c79cd760cce8b0e172.exe 31 PID 308 wrote to memory of 476 308 umim.exe 31 PID 308 wrote to memory of 476 308 umim.exe 31 PID 308 wrote to memory of 476 308 umim.exe 31 PID 308 wrote to memory of 476 308 umim.exe 31 PID 308 wrote to memory of 476 308 umim.exe 31 PID 308 wrote to memory of 1156 308 umim.exe 32 PID 308 wrote to memory of 1156 308 umim.exe 32 PID 308 wrote to memory of 1156 308 umim.exe 32 PID 308 wrote to memory of 1156 308 umim.exe 32 PID 308 wrote to memory of 1156 308 umim.exe 32 PID 308 wrote to memory of 1180 308 umim.exe 34 PID 308 wrote to memory of 1180 308 umim.exe 34 PID 308 wrote to memory of 1180 308 umim.exe 34 PID 308 wrote to memory of 1180 308 umim.exe 34 PID 308 wrote to memory of 1180 308 umim.exe 34 PID 308 wrote to memory of 1280 308 umim.exe 35 PID 308 wrote to memory of 1280 308 umim.exe 35 PID 308 wrote to memory of 1280 308 umim.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1164
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1272
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\4f2e6714b75856c79cd760cce8b0e172.exe"C:\Users\Admin\AppData\Local\Temp\4f2e6714b75856c79cd760cce8b0e172.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\4f2e6714b75856c79cd760cce8b0e172.exe"C:\Users\Admin\AppData\Local\Temp\4f2e6714b75856c79cd760cce8b0e172.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Roaming\Osfy\umim.exe"C:\Users\Admin\AppData\Roaming\Osfy\umim.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\Osfy\umim.exe"C:\Users\Admin\AppData\Roaming\Osfy\umim.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:308
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2ef2dd71.bat"4⤵
- Deletes itself
- Modifies Internet Explorer settings
PID:476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 3924⤵
- Program crash
PID:1156
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1180
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5e8d3c3a137dd0df858f0e52cf0e3b511
SHA1ae2911b16f31cc58f43658490125a72d4f8b29ee
SHA2560d43145d2a37afaf41e223adf2961dfdb109151ad67a3ed9adc80f71fa10d192
SHA5123391971c708125d7a2b20217b56f8ff01d978e961a5c3245ed86026254eddedb2eb366540cd84bb1b75ecdf9f5614e7daa2ff94b6253b402f7c5f45ad53fc76d
-
Filesize
993KB
MD5f14105c5563a2f2fb9f5b2b26e172d8f
SHA14c20a5fe2b4ddee474d7ad22e909106f84e5e01f
SHA256a2ce8f44375ee170d26ad034ce8ac29ea60ca7ad550a049db9a3aee0ae8b27ba
SHA512ab4794b6c8827e2520335db59230cc242b3a17c31c61e6fd0420eabe35f81eba07ab3d3277c2f5aa86dc04a277ce18cf00e857d0f8a59b8fa74c2fe41b9b17a3