Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 11:33

General

  • Target

    6b15f7525da0aa28eed5316a9ca99af3.exe

  • Size

    205KB

  • MD5

    6b15f7525da0aa28eed5316a9ca99af3

  • SHA1

    abf00e087b8474b85e172ed257738a0ea008cdbe

  • SHA256

    671b8553f41641e9d72ef472f239fca4f8d9d1ceb395f277b11935c6f7ac319c

  • SHA512

    982df863bb59a5fc3f516cc49264e3be796897992a90768207bbfe395e562dd4e45974d63ea23fa6547e06ae8e0f3f931659aaef31fe04daed935b589d2e463d

  • SSDEEP

    6144:g3qqDLwQXw/jSbaQm/2YBWs6RaIpL/tL2YoKPpthlWV0J6:gaqnwQujSbaQmF9IpL/Rf5la0s

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1236
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1420
        • C:\Users\Admin\AppData\Local\Temp\6b15f7525da0aa28eed5316a9ca99af3.exe
          "C:\Users\Admin\AppData\Local\Temp\6b15f7525da0aa28eed5316a9ca99af3.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1452
          • C:\Users\Admin\AppData\Roaming\Xiqike\opiv.exe
            "C:\Users\Admin\AppData\Roaming\Xiqike\opiv.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2476
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf4f2bea7.bat"
            3⤵
            • Deletes itself
            • Suspicious use of AdjustPrivilegeToken
            PID:2404
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1328
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:804
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:2136
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:948
            • C:\Windows\system32\conhost.exe
              \??\C:\Windows\system32\conhost.exe "-797954240-80913623-20670691711733645506-555292691280547942-753081600-1944149026"
              1⤵
                PID:1928
              • C:\Program Files\Windows Mail\WinMail.exe
                "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:1888
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1824
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:2392
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:2388
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                      1⤵
                        PID:1272

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735

                        Filesize

                        558B

                        MD5

                        3cc0012f96f8f44164c18d7de05023d9

                        SHA1

                        c8feb560d751fe720c8bdb53f5e78aa92abb9a9e

                        SHA256

                        2654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5

                        SHA512

                        626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        06b12a9d3e9b2e843f9f75e04fc7bc74

                        SHA1

                        f8a0fc7cc85538e44da8547da11078c7dd00c86b

                        SHA256

                        720bd47482fb1566dc52644e0a4c1ebc88ddb464e79510b8b13d71be0d22225e

                        SHA512

                        abb4b0676f77898a9d65d2b53139a8933f8d3bae5d12f02d881ee79a117effc6de7abb19b6f9c27ef96a6457fa2a855ce3ddcdc17543314303357e5db8254616

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735

                        Filesize

                        232B

                        MD5

                        cee5fdaf23ac088fa74e1d14bf2138a9

                        SHA1

                        be16dcf7eb143525ca128eafdfb11aefc5a8cc96

                        SHA256

                        a5d652cfea2888617cec80df200185e73a03bc51a0273a4b107759f5808bb43b

                        SHA512

                        c7567ccf797a42e684853cfdbaba147c386b4d710f0883fe1458cd74405e68996a71a3e98df26f0cac50e4f03c5c57d4d081bd67c2d928eb6e7667bd81569725

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore

                        Filesize

                        2.0MB

                        MD5

                        42731e490a705a286ca5db8a7b1aae64

                        SHA1

                        cbb2eb3d16f9599dfda10355aaf06f62bacd62eb

                        SHA256

                        2e8cc77c00de0a16249bf240abca7508b2d102f5526b14865a9649cf82a4109d

                        SHA512

                        d9fbe0be25e9e86897a3f2a5e3fe2284405c7e8d18e399fc7de3070cace9d40445bdd2b6dfb0d949c183c92af9f7f1724adb6087b149b905ba7782a57016d503

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.chk

                        Filesize

                        8KB

                        MD5

                        4195585859ab0287b7d54588b34fbe53

                        SHA1

                        907cefdbe7a6a02fc61da318073747debb028c9d

                        SHA256

                        b4f5600352843aff7e4f1e21cd4430690d1b8bced70cbfd8f1d2324986c8a89c

                        SHA512

                        afc315a68441943279d3e64766b87ebfd89d1eebcc4f3d8818d889d5b00c193fdd9b786dce3eef82fbeed589a9c0e9f712a8a17005cf5f08bc9c350718ef80f7

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                        Filesize

                        2.0MB

                        MD5

                        2377494af729bfe6667032a604b76f8e

                        SHA1

                        79df49696ddab95068f06d4b213d5c7a70b69a3c

                        SHA256

                        a4bb920dc3b3afca0320a57e129c9bdfbf4d80e91771367b50fd177cbf09eb08

                        SHA512

                        21320dbe04f02103e6a6fd3982d556a09419cbe28e4485c958cd406afa83a58359d64617a2f55e6ed3a7c5b60dd2cfbf9fb67dca33b47aed429453ae311c5f2e

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                        Filesize

                        2.0MB

                        MD5

                        63fed4a6251cd1891348fe2adf546a7d

                        SHA1

                        9587974ad17aa954d5c6c6708e4c679645f13fe3

                        SHA256

                        4a1e93834c6c3e35861153faf946246c3318560c3ee1f8b414b8f9d4b2c0fe6c

                        SHA512

                        edff0bd1a16d4d625aa98ed53ede3b03b2bc48fe978a8442c545f62f2b06f6c4e09d60e8ff6fc156143af1f69d8b43a85a079fbaba54294a96b416e5f69699a9

                      • C:\Users\Admin\AppData\Local\Temp\CabC468.tmp

                        Filesize

                        65KB

                        MD5

                        ac05d27423a85adc1622c714f2cb6184

                        SHA1

                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                        SHA256

                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                        SHA512

                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                      • C:\Users\Admin\AppData\Local\Temp\tmpf4f2bea7.bat

                        Filesize

                        243B

                        MD5

                        4161909c8b5018808514ff96b2774fe4

                        SHA1

                        e4838d5b6f3d5f0de6e5e7f1c4754a6bc62b0916

                        SHA256

                        67a45bd0f06432d78bfb222e8d1026aee1216169095a8b0d92aeea39e7331b76

                        SHA512

                        b8ee9ef0c5035f13b1ca75fd1e64086d49128ea654d68401d6fcc9746c90e9770287f81aaa371c1e8d227609f5e277d1be56f88312b62d03c9b2dd78f7ae2c92

                      • C:\Users\Admin\AppData\Roaming\Wyav\vymek.aqa

                        Filesize

                        4KB

                        MD5

                        b9b9b8e73892058dc4a62dbce6c4b403

                        SHA1

                        2439babd174676f64178c58492c5d9367cfa505b

                        SHA256

                        649edea505d61336a0d35619a70bc6006e0111d8e66196c5ac39d512e32ae3b7

                        SHA512

                        3654d2607e898ce9e3271ab93a5e1100e342bc8b66542ac4fea72f4439b080c4e67083bbe2b692cc85bd2b7b68f782d90fc31e59df9b90f1ef814bd9dee9f239

                      • C:\Users\Admin\AppData\Roaming\Wyav\vymek.aqa

                        Filesize

                        4KB

                        MD5

                        53991cc98201692032b48ca2110d1f60

                        SHA1

                        c50eeee729da0831b10ca551498b01b0b439ac52

                        SHA256

                        e3590f4c8f127d6ee1c078a2afd15f7a0b05caac130bbba791d95ff5a9c440ea

                        SHA512

                        89d37fba201317eb6116b85426c28ce86285c2d2026cdd91dd53ab42d8bc3d1945f3d481d8a8677f6b1a859d4d1432c56ebb962f39afecbc6a69e266ccf1c314

                      • C:\Users\Admin\AppData\Roaming\Wyav\vymek.aqa

                        Filesize

                        4KB

                        MD5

                        82c2461edd48bc6aca1fff36bea99a95

                        SHA1

                        34d1d31e2b38637fd26dbde14143e5d70bdc66e4

                        SHA256

                        80d548ed83446cdcfb9a15d793090172e8aa082ea0cbfd522e94cdc026d4d8d8

                        SHA512

                        f989c057310bbece34e18ca0004679fa240cb7ccb28b8353a0cbf6f665ed47fcbce495162fadde9dd5369d39bd5ecc84191be29214941d58e450c01980688bb6

                      • \Users\Admin\AppData\Roaming\Xiqike\opiv.exe

                        Filesize

                        205KB

                        MD5

                        b24381a6a9f7a3d798d0398cf9039cdb

                        SHA1

                        8af642e7383d9ec407575b4dfa3f12f7779b4f58

                        SHA256

                        71b5474e4d96e8f33711f3bfc98565405d9a3dfd1893fbcc495050c9ffcb0e54

                        SHA512

                        2476516947323738db7870a198566267e0ca30e7d31573b9fd94a346348a0e48d5c8e1000738daa58cd26521efd21063fbef9ab6f9391d5eb2d901313ff526c6

                      • memory/804-36-0x0000000001B70000-0x0000000001BA7000-memory.dmp

                        Filesize

                        220KB

                      • memory/804-34-0x0000000001B70000-0x0000000001BA7000-memory.dmp

                        Filesize

                        220KB

                      • memory/804-35-0x0000000001B70000-0x0000000001BA7000-memory.dmp

                        Filesize

                        220KB

                      • memory/804-37-0x0000000001B70000-0x0000000001BA7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1236-22-0x0000000001E50000-0x0000000001E87000-memory.dmp

                        Filesize

                        220KB

                      • memory/1236-21-0x0000000001E50000-0x0000000001E87000-memory.dmp

                        Filesize

                        220KB

                      • memory/1236-20-0x0000000001E50000-0x0000000001E87000-memory.dmp

                        Filesize

                        220KB

                      • memory/1236-19-0x0000000001E50000-0x0000000001E87000-memory.dmp

                        Filesize

                        220KB

                      • memory/1236-18-0x0000000001E50000-0x0000000001E87000-memory.dmp

                        Filesize

                        220KB

                      • memory/1328-27-0x0000000000120000-0x0000000000157000-memory.dmp

                        Filesize

                        220KB

                      • memory/1328-26-0x0000000000120000-0x0000000000157000-memory.dmp

                        Filesize

                        220KB

                      • memory/1328-25-0x0000000000120000-0x0000000000157000-memory.dmp

                        Filesize

                        220KB

                      • memory/1328-24-0x0000000000120000-0x0000000000157000-memory.dmp

                        Filesize

                        220KB

                      • memory/1420-30-0x0000000002A80000-0x0000000002AB7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1420-32-0x0000000002A80000-0x0000000002AB7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1420-29-0x0000000002A80000-0x0000000002AB7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1420-31-0x0000000002A80000-0x0000000002AB7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-46-0x0000000077570000-0x0000000077571000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-42-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-57-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-59-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-61-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-63-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-65-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-67-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-69-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-71-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-73-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-75-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-231-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-48-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-55-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-44-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-40-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-50-0x00000000001D0000-0x00000000001D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-52-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-43-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-41-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-308-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-39-0x0000000001CB0000-0x0000000001CE7000-memory.dmp

                        Filesize

                        220KB

                      • memory/1452-54-0x0000000077570000-0x0000000077571000-memory.dmp

                        Filesize

                        4KB

                      • memory/1452-0-0x00000000001C0000-0x00000000001C1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2404-507-0x0000000000170000-0x0000000000171000-memory.dmp

                        Filesize

                        4KB

                      • memory/2404-315-0x0000000077570000-0x0000000077571000-memory.dmp

                        Filesize

                        4KB

                      • memory/2404-309-0x0000000000050000-0x0000000000087000-memory.dmp

                        Filesize

                        220KB

                      • memory/2404-711-0x0000000000050000-0x0000000000087000-memory.dmp

                        Filesize

                        220KB