Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    164s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 18:38

General

  • Target

    00b8dc506258fa25a5c7203ce1e70780.exe

  • Size

    93KB

  • MD5

    00b8dc506258fa25a5c7203ce1e70780

  • SHA1

    76bfac985c93e008a35103f455cbff82c39d3bae

  • SHA256

    ede805a4c2781f556deda775d380ced171f8bd07f99d7986b396789ca952e385

  • SHA512

    d0fde3f6ff56c893795cd2d8dc1c50e4ff4eba06c46a19b2556a5ca5a829a3c39e7d0159450022e16ce7d3d5d44e65680f2e497ab7a6d791b7d89dcb0dacdb11

  • SSDEEP

    1536:EwH8Qlr3QF/GTqg8HLhobQLAfm5b8HLljs2mwEhstzWrY6:hTlr39Og8HlKQLAfMmLljJmwEixWrx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1128
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1244
        • C:\Users\Admin\AppData\Local\Temp\00b8dc506258fa25a5c7203ce1e70780.exe
          "C:\Users\Admin\AppData\Local\Temp\00b8dc506258fa25a5c7203ce1e70780.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2372
          • C:\Users\Admin\AppData\Roaming\Ylsey\bepay.exe
            "C:\Users\Admin\AppData\Roaming\Ylsey\bepay.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2700
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp65e55cb0.bat"
            3⤵
            • Deletes itself
            PID:240
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1184
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:2424
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:476
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1088
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1904
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:908

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\tmp65e55cb0.bat

                    Filesize

                    243B

                    MD5

                    82e474fc071c984c30d402e0dd90ea62

                    SHA1

                    ecf952b409125c98f21ffd65d4e98f5dfa90d0f7

                    SHA256

                    9a64f8a009e8132b344fb781649a816f711429018aca1ed5cd2dfe7223aa6d03

                    SHA512

                    023cdd5f756fddf81c2d5a5ee2e6081bc4f98f82c1ef0c56fa3980626faa5a7b4f57748fa9020326055f61a331a9476f3a3e5a27c78a61d0b07c2cac8f7f9eb5

                  • C:\Users\Admin\AppData\Roaming\Ubduzy\hebi.pii

                    Filesize

                    366B

                    MD5

                    f95fcbf84d3216ef1f4c351509917d5d

                    SHA1

                    08d1a9ec5c720322b8da8c253ca2d699dee0a9fc

                    SHA256

                    724853bebc9f4d461b4d91ba72b16768de72aca9865a789feebb0b8933300367

                    SHA512

                    86fc59b20a795e7697ae86b40956bb95adb272e5be6c64fb6cf60fa54b41d1916bbda61e840417bb296ba583e2fcc2a61bb46c5fc871f3864a0fe5d6a34384f2

                  • \Users\Admin\AppData\Roaming\Ylsey\bepay.exe

                    Filesize

                    93KB

                    MD5

                    12aff9247bf6b7972eb283e9e2b587a9

                    SHA1

                    e6f001079c1220c38f9ba6fb5a598c30ea09b6f2

                    SHA256

                    d7c7d5c67ed30c46140192a87ef77d5806d3631f539dd260bae1780872f08823

                    SHA512

                    b9ccd6d531829459a8ecfc384ef45768b67f4b04c1887ff46189d5620a023f93bd9cecb8ddc99ece40ffa56475d75ead093bef9f0277517f39457b710abb71b7

                  • memory/240-79-0x0000000000050000-0x000000000006A000-memory.dmp

                    Filesize

                    104KB

                  • memory/240-76-0x0000000000050000-0x000000000006A000-memory.dmp

                    Filesize

                    104KB

                  • memory/240-78-0x0000000000050000-0x000000000006A000-memory.dmp

                    Filesize

                    104KB

                  • memory/240-80-0x0000000000050000-0x000000000006A000-memory.dmp

                    Filesize

                    104KB

                  • memory/240-85-0x0000000000050000-0x000000000006A000-memory.dmp

                    Filesize

                    104KB

                  • memory/240-87-0x0000000077320000-0x0000000077321000-memory.dmp

                    Filesize

                    4KB

                  • memory/240-115-0x0000000000050000-0x000000000006A000-memory.dmp

                    Filesize

                    104KB

                  • memory/240-113-0x00000000001D0000-0x00000000001D1000-memory.dmp

                    Filesize

                    4KB

                  • memory/1128-18-0x0000000000400000-0x000000000041A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1128-14-0x0000000000400000-0x000000000041A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1128-12-0x0000000000400000-0x000000000041A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1128-10-0x0000000000400000-0x000000000041A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1184-21-0x0000000000130000-0x000000000014A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1184-24-0x0000000000130000-0x000000000014A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1184-23-0x0000000000130000-0x000000000014A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1184-22-0x0000000000130000-0x000000000014A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1244-29-0x0000000002A00000-0x0000000002A1A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1244-28-0x0000000002A00000-0x0000000002A1A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1244-27-0x0000000002A00000-0x0000000002A1A000-memory.dmp

                    Filesize

                    104KB

                  • memory/1244-26-0x0000000002A00000-0x0000000002A1A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2372-46-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-70-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-48-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-50-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-52-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-54-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-56-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-58-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-60-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-62-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-64-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-66-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-68-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-44-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-72-0x0000000000420000-0x000000000043A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2372-39-0x0000000000420000-0x000000000043A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2372-42-0x0000000077320000-0x0000000077321000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-41-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-40-0x0000000077320000-0x0000000077321000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-37-0x00000000003F0000-0x00000000003F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2372-36-0x0000000000420000-0x000000000043A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2372-35-0x0000000000420000-0x000000000043A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2372-34-0x0000000000420000-0x000000000043A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2372-33-0x0000000000420000-0x000000000043A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2372-32-0x0000000000420000-0x000000000043A000-memory.dmp

                    Filesize

                    104KB