Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
5bc95bed82a1d5ece16614c1ad6f47ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bc95bed82a1d5ece16614c1ad6f47ed.exe
Resource
win10v2004-20231215-en
General
-
Target
5bc95bed82a1d5ece16614c1ad6f47ed.exe
-
Size
410KB
-
MD5
5bc95bed82a1d5ece16614c1ad6f47ed
-
SHA1
a2c39bd194170119dc8aa01d5d48db5b813956e5
-
SHA256
16b4906b0d7e62d8d65ce8e8428acacccb56b72f74f82f7ad9a9d44b7ec1c9e9
-
SHA512
efb6c4583980d0753e7d507d9faaa66a555f491756419996110fbcbdabff7838a26ecfa189525b2c7c659659e313a9485ba5ad5ccf61cf74039bd2df8ac48e71
-
SSDEEP
12288:g7SOoqLdsGPAm5KzTIwiKHiUeWEUjbsloBi8:g74qLiaCdHfeWaoc8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1560 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 fyjyvy.exe -
Loads dropped DLL 1 IoCs
pid Process 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\{94926AC8-CECC-AD4E-05C4-B4AE0A3C97B3} = "C:\\Users\\Admin\\AppData\\Roaming\\Liitho\\fyjyvy.exe" fyjyvy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1692 set thread context of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe 2904 fyjyvy.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 2904 fyjyvy.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2904 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 28 PID 1692 wrote to memory of 2904 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 28 PID 1692 wrote to memory of 2904 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 28 PID 1692 wrote to memory of 2904 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 28 PID 2904 wrote to memory of 1128 2904 fyjyvy.exe 11 PID 2904 wrote to memory of 1128 2904 fyjyvy.exe 11 PID 2904 wrote to memory of 1128 2904 fyjyvy.exe 11 PID 2904 wrote to memory of 1128 2904 fyjyvy.exe 11 PID 2904 wrote to memory of 1128 2904 fyjyvy.exe 11 PID 2904 wrote to memory of 1180 2904 fyjyvy.exe 10 PID 2904 wrote to memory of 1180 2904 fyjyvy.exe 10 PID 2904 wrote to memory of 1180 2904 fyjyvy.exe 10 PID 2904 wrote to memory of 1180 2904 fyjyvy.exe 10 PID 2904 wrote to memory of 1180 2904 fyjyvy.exe 10 PID 2904 wrote to memory of 1212 2904 fyjyvy.exe 8 PID 2904 wrote to memory of 1212 2904 fyjyvy.exe 8 PID 2904 wrote to memory of 1212 2904 fyjyvy.exe 8 PID 2904 wrote to memory of 1212 2904 fyjyvy.exe 8 PID 2904 wrote to memory of 1212 2904 fyjyvy.exe 8 PID 2904 wrote to memory of 2520 2904 fyjyvy.exe 7 PID 2904 wrote to memory of 2520 2904 fyjyvy.exe 7 PID 2904 wrote to memory of 2520 2904 fyjyvy.exe 7 PID 2904 wrote to memory of 2520 2904 fyjyvy.exe 7 PID 2904 wrote to memory of 2520 2904 fyjyvy.exe 7 PID 2904 wrote to memory of 1692 2904 fyjyvy.exe 9 PID 2904 wrote to memory of 1692 2904 fyjyvy.exe 9 PID 2904 wrote to memory of 1692 2904 fyjyvy.exe 9 PID 2904 wrote to memory of 1692 2904 fyjyvy.exe 9 PID 2904 wrote to memory of 1692 2904 fyjyvy.exe 9 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29 PID 1692 wrote to memory of 1560 1692 5bc95bed82a1d5ece16614c1ad6f47ed.exe 29
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2520
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\5bc95bed82a1d5ece16614c1ad6f47ed.exe"C:\Users\Admin\AppData\Local\Temp\5bc95bed82a1d5ece16614c1ad6f47ed.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\Liitho\fyjyvy.exe"C:\Users\Admin\AppData\Roaming\Liitho\fyjyvy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd5bb883e.bat"3⤵
- Deletes itself
PID:1560
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD561579be7cd679f448126aa7bf50dd34b
SHA17b56142993b7fac88c5c12a1435f0793f2a3dd59
SHA256b89bb94a86f862d3425b808329db223688555217d0d7e3dd1c67576eecf3eb9f
SHA51299045364d623fbcf443b3740cf0504e9cfcfe914b95aa6071c15fa45e82a5b428aecf9325038dc20b6bfc330eac91bfba3f9bb51e9a9edfcb2a2c28f404c2a38
-
Filesize
93KB
MD5de74ac16da15a82a37c750dcdbe3d219
SHA1424db8c60e04f6a9d5abf5460db7fdb92138ec0b
SHA25636137a9369b75ce4173375d2ddafdaba247f95d9a7e3b3d19bcc59912ce6129b
SHA5127c8121aaa47cce339d7bec0395805f5f478b2649ce4148f730562b173879c3338253cb65f1ce40a3b41fc15b9410954fbe3cd49489dfdf8eb902855a0483fb0a
-
Filesize
320KB
MD56de776e51cffe965b55c8873cf52dc1d
SHA16645fcb287212f55e64cee2d3a5a710ec08e2be3
SHA256c23b23e4faeb6c4b82b966448b9c2a5393e8d2880186ae15801c72a89a6b8f84
SHA512d1ebcea307c3cdc8e19a5b991cae4b9fc2c461b7b4d7a5c844cf0d5108281a9112ef82d15bb3efabf8e85c0c4acb9e3899f2d018b584c0f76bcf62257d6aa14c