Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
00b8dc506258fa25a5c7203ce1e70780.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00b8dc506258fa25a5c7203ce1e70780.exe
Resource
win10v2004-20231215-en
General
-
Target
00b8dc506258fa25a5c7203ce1e70780.exe
-
Size
93KB
-
MD5
00b8dc506258fa25a5c7203ce1e70780
-
SHA1
76bfac985c93e008a35103f455cbff82c39d3bae
-
SHA256
ede805a4c2781f556deda775d380ced171f8bd07f99d7986b396789ca952e385
-
SHA512
d0fde3f6ff56c893795cd2d8dc1c50e4ff4eba06c46a19b2556a5ca5a829a3c39e7d0159450022e16ce7d3d5d44e65680f2e497ab7a6d791b7d89dcb0dacdb11
-
SSDEEP
1536:EwH8Qlr3QF/GTqg8HLhobQLAfm5b8HLljs2mwEhstzWrY6:hTlr39Og8HlKQLAfMmLljJmwEixWrx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 240 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 bepay.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 00b8dc506258fa25a5c7203ce1e70780.exe 2372 00b8dc506258fa25a5c7203ce1e70780.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\{99B57FE8-54A4-4764-0E00-BF625DF8C00E} = "C:\\Users\\Admin\\AppData\\Roaming\\Ylsey\\bepay.exe" bepay.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy 00b8dc506258fa25a5c7203ce1e70780.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 00b8dc506258fa25a5c7203ce1e70780.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe 2700 bepay.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2372 00b8dc506258fa25a5c7203ce1e70780.exe Token: SeSecurityPrivilege 2372 00b8dc506258fa25a5c7203ce1e70780.exe Token: SeSecurityPrivilege 2372 00b8dc506258fa25a5c7203ce1e70780.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2700 2372 00b8dc506258fa25a5c7203ce1e70780.exe 27 PID 2372 wrote to memory of 2700 2372 00b8dc506258fa25a5c7203ce1e70780.exe 27 PID 2372 wrote to memory of 2700 2372 00b8dc506258fa25a5c7203ce1e70780.exe 27 PID 2372 wrote to memory of 2700 2372 00b8dc506258fa25a5c7203ce1e70780.exe 27 PID 2700 wrote to memory of 1128 2700 bepay.exe 12 PID 2700 wrote to memory of 1128 2700 bepay.exe 12 PID 2700 wrote to memory of 1128 2700 bepay.exe 12 PID 2700 wrote to memory of 1128 2700 bepay.exe 12 PID 2700 wrote to memory of 1128 2700 bepay.exe 12 PID 2700 wrote to memory of 1184 2700 bepay.exe 18 PID 2700 wrote to memory of 1184 2700 bepay.exe 18 PID 2700 wrote to memory of 1184 2700 bepay.exe 18 PID 2700 wrote to memory of 1184 2700 bepay.exe 18 PID 2700 wrote to memory of 1184 2700 bepay.exe 18 PID 2700 wrote to memory of 1244 2700 bepay.exe 17 PID 2700 wrote to memory of 1244 2700 bepay.exe 17 PID 2700 wrote to memory of 1244 2700 bepay.exe 17 PID 2700 wrote to memory of 1244 2700 bepay.exe 17 PID 2700 wrote to memory of 1244 2700 bepay.exe 17 PID 2700 wrote to memory of 2372 2700 bepay.exe 26 PID 2700 wrote to memory of 2372 2700 bepay.exe 26 PID 2700 wrote to memory of 2372 2700 bepay.exe 26 PID 2700 wrote to memory of 2372 2700 bepay.exe 26 PID 2700 wrote to memory of 2372 2700 bepay.exe 26 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2372 wrote to memory of 240 2372 00b8dc506258fa25a5c7203ce1e70780.exe 28 PID 2700 wrote to memory of 2424 2700 bepay.exe 30 PID 2700 wrote to memory of 2424 2700 bepay.exe 30 PID 2700 wrote to memory of 2424 2700 bepay.exe 30 PID 2700 wrote to memory of 2424 2700 bepay.exe 30 PID 2700 wrote to memory of 2424 2700 bepay.exe 30 PID 2700 wrote to memory of 476 2700 bepay.exe 31 PID 2700 wrote to memory of 476 2700 bepay.exe 31 PID 2700 wrote to memory of 476 2700 bepay.exe 31 PID 2700 wrote to memory of 476 2700 bepay.exe 31 PID 2700 wrote to memory of 476 2700 bepay.exe 31 PID 2700 wrote to memory of 1088 2700 bepay.exe 34 PID 2700 wrote to memory of 1088 2700 bepay.exe 34 PID 2700 wrote to memory of 1088 2700 bepay.exe 34 PID 2700 wrote to memory of 1088 2700 bepay.exe 34 PID 2700 wrote to memory of 1088 2700 bepay.exe 34 PID 2700 wrote to memory of 1904 2700 bepay.exe 35 PID 2700 wrote to memory of 1904 2700 bepay.exe 35 PID 2700 wrote to memory of 1904 2700 bepay.exe 35 PID 2700 wrote to memory of 1904 2700 bepay.exe 35 PID 2700 wrote to memory of 1904 2700 bepay.exe 35 PID 2700 wrote to memory of 908 2700 bepay.exe 36 PID 2700 wrote to memory of 908 2700 bepay.exe 36 PID 2700 wrote to memory of 908 2700 bepay.exe 36 PID 2700 wrote to memory of 908 2700 bepay.exe 36 PID 2700 wrote to memory of 908 2700 bepay.exe 36
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\00b8dc506258fa25a5c7203ce1e70780.exe"C:\Users\Admin\AppData\Local\Temp\00b8dc506258fa25a5c7203ce1e70780.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\Ylsey\bepay.exe"C:\Users\Admin\AppData\Roaming\Ylsey\bepay.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp65e55cb0.bat"3⤵
- Deletes itself
PID:240
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2424
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:476
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1088
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1904
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD582e474fc071c984c30d402e0dd90ea62
SHA1ecf952b409125c98f21ffd65d4e98f5dfa90d0f7
SHA2569a64f8a009e8132b344fb781649a816f711429018aca1ed5cd2dfe7223aa6d03
SHA512023cdd5f756fddf81c2d5a5ee2e6081bc4f98f82c1ef0c56fa3980626faa5a7b4f57748fa9020326055f61a331a9476f3a3e5a27c78a61d0b07c2cac8f7f9eb5
-
Filesize
366B
MD5f95fcbf84d3216ef1f4c351509917d5d
SHA108d1a9ec5c720322b8da8c253ca2d699dee0a9fc
SHA256724853bebc9f4d461b4d91ba72b16768de72aca9865a789feebb0b8933300367
SHA51286fc59b20a795e7697ae86b40956bb95adb272e5be6c64fb6cf60fa54b41d1916bbda61e840417bb296ba583e2fcc2a61bb46c5fc871f3864a0fe5d6a34384f2
-
Filesize
93KB
MD512aff9247bf6b7972eb283e9e2b587a9
SHA1e6f001079c1220c38f9ba6fb5a598c30ea09b6f2
SHA256d7c7d5c67ed30c46140192a87ef77d5806d3631f539dd260bae1780872f08823
SHA512b9ccd6d531829459a8ecfc384ef45768b67f4b04c1887ff46189d5620a023f93bd9cecb8ddc99ece40ffa56475d75ead093bef9f0277517f39457b710abb71b7