Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
fd8edc33611a7b8f191cf6d72913f7f6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fd8edc33611a7b8f191cf6d72913f7f6.exe
Resource
win10v2004-20231215-en
General
-
Target
fd8edc33611a7b8f191cf6d72913f7f6.exe
-
Size
151KB
-
MD5
fd8edc33611a7b8f191cf6d72913f7f6
-
SHA1
1ee223b840eb163ad74cf4c03c0cedd37c1be33e
-
SHA256
742246e234d3b4b30fa992fc15e9639521a56b4ce9d7930c9ae40ec67da1c6aa
-
SHA512
ecb026b0d69e246aa93b4bb5b21798c19b65228420e80bf20e67f7ecbb4b5e37c4b345aba2261403c6ff38c64fad97fec724675103530af581a1c1d783176607
-
SSDEEP
3072:LMWf/3nF86xa3/hJdLrU2PuBllkqfWmt54wsAJy508cUOTl4+wNDXc:XHFdQtTGBllpWGVZL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1360 buih.exe -
Loads dropped DLL 2 IoCs
pid Process 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A5E67C61-19B1-34F0-9E45-38CB1ADAA6E0} = "C:\\Users\\Admin\\AppData\\Roaming\\Wook\\buih.exe" buih.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2364 set thread context of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 set thread context of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Privacy fd8edc33611a7b8f191cf6d72913f7f6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" fd8edc33611a7b8f191cf6d72913f7f6.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe 1360 buih.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe Token: SeSecurityPrivilege 1360 buih.exe Token: SeSecurityPrivilege 1360 buih.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 2364 wrote to memory of 1360 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 22 PID 1360 wrote to memory of 1048 1360 buih.exe 10 PID 1360 wrote to memory of 1048 1360 buih.exe 10 PID 1360 wrote to memory of 1048 1360 buih.exe 10 PID 1360 wrote to memory of 1048 1360 buih.exe 10 PID 1360 wrote to memory of 1048 1360 buih.exe 10 PID 1360 wrote to memory of 1076 1360 buih.exe 9 PID 1360 wrote to memory of 1076 1360 buih.exe 9 PID 1360 wrote to memory of 1076 1360 buih.exe 9 PID 1360 wrote to memory of 1076 1360 buih.exe 9 PID 1360 wrote to memory of 1076 1360 buih.exe 9 PID 1360 wrote to memory of 1116 1360 buih.exe 8 PID 1360 wrote to memory of 1116 1360 buih.exe 8 PID 1360 wrote to memory of 1116 1360 buih.exe 8 PID 1360 wrote to memory of 1116 1360 buih.exe 8 PID 1360 wrote to memory of 1116 1360 buih.exe 8 PID 1360 wrote to memory of 2172 1360 buih.exe 5 PID 1360 wrote to memory of 2172 1360 buih.exe 5 PID 1360 wrote to memory of 2172 1360 buih.exe 5 PID 1360 wrote to memory of 2172 1360 buih.exe 5 PID 1360 wrote to memory of 2172 1360 buih.exe 5 PID 1360 wrote to memory of 2364 1360 buih.exe 13 PID 1360 wrote to memory of 2364 1360 buih.exe 13 PID 1360 wrote to memory of 2364 1360 buih.exe 13 PID 1360 wrote to memory of 2364 1360 buih.exe 13 PID 1360 wrote to memory of 2364 1360 buih.exe 13 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 2364 wrote to memory of 2372 2364 fd8edc33611a7b8f191cf6d72913f7f6.exe 23 PID 1360 wrote to memory of 1804 1360 buih.exe 31 PID 1360 wrote to memory of 1804 1360 buih.exe 31 PID 1360 wrote to memory of 1804 1360 buih.exe 31 PID 1360 wrote to memory of 1804 1360 buih.exe 31 PID 1360 wrote to memory of 1804 1360 buih.exe 31 PID 1360 wrote to memory of 2344 1360 buih.exe 32 PID 1360 wrote to memory of 2344 1360 buih.exe 32 PID 1360 wrote to memory of 2344 1360 buih.exe 32 PID 1360 wrote to memory of 2344 1360 buih.exe 32 PID 1360 wrote to memory of 2344 1360 buih.exe 32
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\fd8edc33611a7b8f191cf6d72913f7f6.exe"C:\Users\Admin\AppData\Local\Temp\fd8edc33611a7b8f191cf6d72913f7f6.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\Wook\buih.exe"C:\Users\Admin\AppData\Roaming\Wook\buih.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7bcd013a.bat"3⤵
- Deletes itself
PID:2372
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1048
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1804
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5fec46477eb136a8bb59eaa056122a017
SHA1d6d04f0a77f1ea2141c59e80233a9dda8a062bb6
SHA2562ee704243d2e06165707263d0623dee0a37057076f8168b9b3e185e3387b1859
SHA512f5607b995d7713289df1b95bbd58a19a8c50755e3b2f9343b2d632ff69c7bafe71a591d377d90fc3229aea5684378ca3e542eed5f7e714c84f952c8ad522fc3d
-
Filesize
151KB
MD5fd8edc33611a7b8f191cf6d72913f7f6
SHA11ee223b840eb163ad74cf4c03c0cedd37c1be33e
SHA256742246e234d3b4b30fa992fc15e9639521a56b4ce9d7930c9ae40ec67da1c6aa
SHA512ecb026b0d69e246aa93b4bb5b21798c19b65228420e80bf20e67f7ecbb4b5e37c4b345aba2261403c6ff38c64fad97fec724675103530af581a1c1d783176607
-
Filesize
92KB
MD536d5093b7b525fe42b94ce61012bb19b
SHA1d3317b52b46dee0cfa9e9e2bc9d81c77e9e14c5b
SHA2565799f13c59d2ada1c117dc98c2d28760e059fb311566a8f23dce4010e046622e
SHA512d63a4f15e802eea4155faa333b0e9e9aab248151b506b44c1d4360c96f521d3584fb4210c1867f823317c2b62323ad84f08ed03bede9cbba02aea1717d5a4f15