Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
6b15f7525da0aa28eed5316a9ca99af3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6b15f7525da0aa28eed5316a9ca99af3.exe
Resource
win10v2004-20231215-en
General
-
Target
6b15f7525da0aa28eed5316a9ca99af3.exe
-
Size
205KB
-
MD5
6b15f7525da0aa28eed5316a9ca99af3
-
SHA1
abf00e087b8474b85e172ed257738a0ea008cdbe
-
SHA256
671b8553f41641e9d72ef472f239fca4f8d9d1ceb395f277b11935c6f7ac319c
-
SHA512
982df863bb59a5fc3f516cc49264e3be796897992a90768207bbfe395e562dd4e45974d63ea23fa6547e06ae8e0f3f931659aaef31fe04daed935b589d2e463d
-
SSDEEP
6144:g3qqDLwQXw/jSbaQm/2YBWs6RaIpL/tL2YoKPpthlWV0J6:gaqnwQujSbaQmF9IpL/Rf5la0s
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2404 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 opiv.exe -
Loads dropped DLL 2 IoCs
pid Process 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 1452 6b15f7525da0aa28eed5316a9ca99af3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rogado = "C:\\Users\\Admin\\AppData\\Roaming\\Xiqike\\opiv.exe" opiv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1452 set thread context of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy 6b15f7525da0aa28eed5316a9ca99af3.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 6b15f7525da0aa28eed5316a9ca99af3.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7B476147-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe 2476 opiv.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeSecurityPrivilege 1452 6b15f7525da0aa28eed5316a9ca99af3.exe Token: SeManageVolumePrivilege 2136 WinMail.exe Token: SeSecurityPrivilege 2404 cmd.exe Token: SeSecurityPrivilege 2404 cmd.exe Token: SeSecurityPrivilege 2404 cmd.exe Token: SeManageVolumePrivilege 1888 WinMail.exe Token: SeSecurityPrivilege 2404 cmd.exe Token: SeSecurityPrivilege 2404 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2136 WinMail.exe 1888 WinMail.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2136 WinMail.exe 1888 WinMail.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2136 WinMail.exe 1888 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2476 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 28 PID 1452 wrote to memory of 2476 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 28 PID 1452 wrote to memory of 2476 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 28 PID 1452 wrote to memory of 2476 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 28 PID 2476 wrote to memory of 1236 2476 opiv.exe 18 PID 2476 wrote to memory of 1236 2476 opiv.exe 18 PID 2476 wrote to memory of 1236 2476 opiv.exe 18 PID 2476 wrote to memory of 1236 2476 opiv.exe 18 PID 2476 wrote to memory of 1236 2476 opiv.exe 18 PID 2476 wrote to memory of 1328 2476 opiv.exe 21 PID 2476 wrote to memory of 1328 2476 opiv.exe 21 PID 2476 wrote to memory of 1328 2476 opiv.exe 21 PID 2476 wrote to memory of 1328 2476 opiv.exe 21 PID 2476 wrote to memory of 1328 2476 opiv.exe 21 PID 2476 wrote to memory of 1420 2476 opiv.exe 20 PID 2476 wrote to memory of 1420 2476 opiv.exe 20 PID 2476 wrote to memory of 1420 2476 opiv.exe 20 PID 2476 wrote to memory of 1420 2476 opiv.exe 20 PID 2476 wrote to memory of 1420 2476 opiv.exe 20 PID 2476 wrote to memory of 804 2476 opiv.exe 22 PID 2476 wrote to memory of 804 2476 opiv.exe 22 PID 2476 wrote to memory of 804 2476 opiv.exe 22 PID 2476 wrote to memory of 804 2476 opiv.exe 22 PID 2476 wrote to memory of 804 2476 opiv.exe 22 PID 2476 wrote to memory of 1452 2476 opiv.exe 27 PID 2476 wrote to memory of 1452 2476 opiv.exe 27 PID 2476 wrote to memory of 1452 2476 opiv.exe 27 PID 2476 wrote to memory of 1452 2476 opiv.exe 27 PID 2476 wrote to memory of 1452 2476 opiv.exe 27 PID 2476 wrote to memory of 2136 2476 opiv.exe 29 PID 2476 wrote to memory of 2136 2476 opiv.exe 29 PID 2476 wrote to memory of 2136 2476 opiv.exe 29 PID 2476 wrote to memory of 2136 2476 opiv.exe 29 PID 2476 wrote to memory of 2136 2476 opiv.exe 29 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 1452 wrote to memory of 2404 1452 6b15f7525da0aa28eed5316a9ca99af3.exe 30 PID 2476 wrote to memory of 948 2476 opiv.exe 31 PID 2476 wrote to memory of 948 2476 opiv.exe 31 PID 2476 wrote to memory of 948 2476 opiv.exe 31 PID 2476 wrote to memory of 948 2476 opiv.exe 31 PID 2476 wrote to memory of 948 2476 opiv.exe 31 PID 2476 wrote to memory of 1928 2476 opiv.exe 32 PID 2476 wrote to memory of 1928 2476 opiv.exe 32 PID 2476 wrote to memory of 1928 2476 opiv.exe 32 PID 2476 wrote to memory of 1928 2476 opiv.exe 32 PID 2476 wrote to memory of 1928 2476 opiv.exe 32 PID 2476 wrote to memory of 1888 2476 opiv.exe 33 PID 2476 wrote to memory of 1888 2476 opiv.exe 33 PID 2476 wrote to memory of 1888 2476 opiv.exe 33 PID 2476 wrote to memory of 1888 2476 opiv.exe 33 PID 2476 wrote to memory of 1888 2476 opiv.exe 33 PID 2476 wrote to memory of 1824 2476 opiv.exe 34 PID 2476 wrote to memory of 1824 2476 opiv.exe 34 PID 2476 wrote to memory of 1824 2476 opiv.exe 34 PID 2476 wrote to memory of 1824 2476 opiv.exe 34 PID 2476 wrote to memory of 1824 2476 opiv.exe 34 PID 2476 wrote to memory of 2392 2476 opiv.exe 37
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1236
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\6b15f7525da0aa28eed5316a9ca99af3.exe"C:\Users\Admin\AppData\Local\Temp\6b15f7525da0aa28eed5316a9ca99af3.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\Xiqike\opiv.exe"C:\Users\Admin\AppData\Roaming\Xiqike\opiv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf4f2bea7.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:804
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2136
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:948
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-797954240-80913623-20670691711733645506-555292691280547942-753081600-1944149026"1⤵PID:1928
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1888
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1824
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2392
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2388
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558B
MD53cc0012f96f8f44164c18d7de05023d9
SHA1c8feb560d751fe720c8bdb53f5e78aa92abb9a9e
SHA2562654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5
SHA512626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b12a9d3e9b2e843f9f75e04fc7bc74
SHA1f8a0fc7cc85538e44da8547da11078c7dd00c86b
SHA256720bd47482fb1566dc52644e0a4c1ebc88ddb464e79510b8b13d71be0d22225e
SHA512abb4b0676f77898a9d65d2b53139a8933f8d3bae5d12f02d881ee79a117effc6de7abb19b6f9c27ef96a6457fa2a855ce3ddcdc17543314303357e5db8254616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735
Filesize232B
MD5cee5fdaf23ac088fa74e1d14bf2138a9
SHA1be16dcf7eb143525ca128eafdfb11aefc5a8cc96
SHA256a5d652cfea2888617cec80df200185e73a03bc51a0273a4b107759f5808bb43b
SHA512c7567ccf797a42e684853cfdbaba147c386b4d710f0883fe1458cd74405e68996a71a3e98df26f0cac50e4f03c5c57d4d081bd67c2d928eb6e7667bd81569725
-
Filesize
2.0MB
MD542731e490a705a286ca5db8a7b1aae64
SHA1cbb2eb3d16f9599dfda10355aaf06f62bacd62eb
SHA2562e8cc77c00de0a16249bf240abca7508b2d102f5526b14865a9649cf82a4109d
SHA512d9fbe0be25e9e86897a3f2a5e3fe2284405c7e8d18e399fc7de3070cace9d40445bdd2b6dfb0d949c183c92af9f7f1724adb6087b149b905ba7782a57016d503
-
Filesize
8KB
MD54195585859ab0287b7d54588b34fbe53
SHA1907cefdbe7a6a02fc61da318073747debb028c9d
SHA256b4f5600352843aff7e4f1e21cd4430690d1b8bced70cbfd8f1d2324986c8a89c
SHA512afc315a68441943279d3e64766b87ebfd89d1eebcc4f3d8818d889d5b00c193fdd9b786dce3eef82fbeed589a9c0e9f712a8a17005cf5f08bc9c350718ef80f7
-
Filesize
2.0MB
MD52377494af729bfe6667032a604b76f8e
SHA179df49696ddab95068f06d4b213d5c7a70b69a3c
SHA256a4bb920dc3b3afca0320a57e129c9bdfbf4d80e91771367b50fd177cbf09eb08
SHA51221320dbe04f02103e6a6fd3982d556a09419cbe28e4485c958cd406afa83a58359d64617a2f55e6ed3a7c5b60dd2cfbf9fb67dca33b47aed429453ae311c5f2e
-
Filesize
2.0MB
MD563fed4a6251cd1891348fe2adf546a7d
SHA19587974ad17aa954d5c6c6708e4c679645f13fe3
SHA2564a1e93834c6c3e35861153faf946246c3318560c3ee1f8b414b8f9d4b2c0fe6c
SHA512edff0bd1a16d4d625aa98ed53ede3b03b2bc48fe978a8442c545f62f2b06f6c4e09d60e8ff6fc156143af1f69d8b43a85a079fbaba54294a96b416e5f69699a9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
243B
MD54161909c8b5018808514ff96b2774fe4
SHA1e4838d5b6f3d5f0de6e5e7f1c4754a6bc62b0916
SHA25667a45bd0f06432d78bfb222e8d1026aee1216169095a8b0d92aeea39e7331b76
SHA512b8ee9ef0c5035f13b1ca75fd1e64086d49128ea654d68401d6fcc9746c90e9770287f81aaa371c1e8d227609f5e277d1be56f88312b62d03c9b2dd78f7ae2c92
-
Filesize
4KB
MD5b9b9b8e73892058dc4a62dbce6c4b403
SHA12439babd174676f64178c58492c5d9367cfa505b
SHA256649edea505d61336a0d35619a70bc6006e0111d8e66196c5ac39d512e32ae3b7
SHA5123654d2607e898ce9e3271ab93a5e1100e342bc8b66542ac4fea72f4439b080c4e67083bbe2b692cc85bd2b7b68f782d90fc31e59df9b90f1ef814bd9dee9f239
-
Filesize
4KB
MD553991cc98201692032b48ca2110d1f60
SHA1c50eeee729da0831b10ca551498b01b0b439ac52
SHA256e3590f4c8f127d6ee1c078a2afd15f7a0b05caac130bbba791d95ff5a9c440ea
SHA51289d37fba201317eb6116b85426c28ce86285c2d2026cdd91dd53ab42d8bc3d1945f3d481d8a8677f6b1a859d4d1432c56ebb962f39afecbc6a69e266ccf1c314
-
Filesize
4KB
MD582c2461edd48bc6aca1fff36bea99a95
SHA134d1d31e2b38637fd26dbde14143e5d70bdc66e4
SHA25680d548ed83446cdcfb9a15d793090172e8aa082ea0cbfd522e94cdc026d4d8d8
SHA512f989c057310bbece34e18ca0004679fa240cb7ccb28b8353a0cbf6f665ed47fcbce495162fadde9dd5369d39bd5ecc84191be29214941d58e450c01980688bb6
-
Filesize
205KB
MD5b24381a6a9f7a3d798d0398cf9039cdb
SHA18af642e7383d9ec407575b4dfa3f12f7779b4f58
SHA25671b5474e4d96e8f33711f3bfc98565405d9a3dfd1893fbcc495050c9ffcb0e54
SHA5122476516947323738db7870a198566267e0ca30e7d31573b9fd94a346348a0e48d5c8e1000738daa58cd26521efd21063fbef9ab6f9391d5eb2d901313ff526c6