Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe
Resource
win10v2004-20231215-en
General
-
Target
7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe
-
Size
21KB
-
MD5
7f2fa5e6e1b91cef1abaabf9deb8d8a8
-
SHA1
30c67e926d87c6b7d56a8b519846147e0ca20cec
-
SHA256
7dd08465bf4c332a6376262ad823e1bd554b5b9fe5576826730f5f30ef25dbbe
-
SHA512
8f6b2605a38fc029918c563c40034e82818a92c50fe3d8e76c91d01bfc5ee45295e0509b4bc5e8dcf4ac75c3d8dd000cc5cf083cf05c20bfa3620e180c9bb14d
-
SSDEEP
384:gKHlpQxVmFDAKOPQ6htarqUOfkpSS/eJEeBVkStMRqKC8IoVfU9XfPdi555J4197:FQxsFDXiQ6WrqV+/e2CVhJX9XfPdi556
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\ysihqg68.sys 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe File opened for modification C:\Windows\SysWOW64\drivers\ysihqg68.sys 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ysihqg68\ImagePath = "system32\\\\drivers\\\\ysihqg68.sys" 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe -
Loads dropped DLL 1 IoCs
pid Process 2280 Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ysihqg68.dll 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe File opened for modification C:\Windows\SysWOW64\ysihqg68.dll 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\DVL Rundll32.exe File created C:\Windows\fn00321.log 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 Rundll32.exe 2280 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2280 Rundll32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2280 5052 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe 88 PID 5052 wrote to memory of 2280 5052 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe 88 PID 5052 wrote to memory of 2280 5052 7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe 88 PID 2280 wrote to memory of 3380 2280 Rundll32.exe 49 PID 2280 wrote to memory of 3380 2280 Rundll32.exe 49
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe"C:\Users\Admin\AppData\Local\Temp\7f2fa5e6e1b91cef1abaabf9deb8d8a8.exe"2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\system32\\Rundll32.exe "C:\Windows\system32\\ysihqg68.dll",DllCanUnloadNow3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5ec03c4006e402e8b0d21091635c9d317
SHA1af280b9ab2eb97352e70f15e15f2fa6b8bf339aa
SHA2561213183b9205d87fffffc5172c4c12123d26a1d7b9721c5362829301d7b51f9e
SHA512c864f117ccaca6422227e9efeb60c2fb2c0ce845a6b3a90ccd590bb2c26ee6c99f85ea6f44c00ec755e2588c583c4f2465749d9f7bfd0dba02c76e628d350b6b