Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
0162043ff06fc0b7df59995580637c08.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0162043ff06fc0b7df59995580637c08.exe
Resource
win10v2004-20231215-en
General
-
Target
0162043ff06fc0b7df59995580637c08.exe
-
Size
10.1MB
-
MD5
0162043ff06fc0b7df59995580637c08
-
SHA1
dbc586ca0e60b45b96824f4daa8d0ec4d3d41bdd
-
SHA256
68144fe9a725e15493eb9156fc66f401701aff5daec246cb7489eca9993fa751
-
SHA512
76bdd28851dd82ff301f77e98a1cd03cc6950dfdd04396293fb4d1181c74febdead5574b2a5d20148908a9a13850be83b279c1a5248be633bf30b62aa953c121
-
SSDEEP
196608:YV8YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY4:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2736 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 mwrmddwc.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2624 sc.exe 2700 sc.exe 2724 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3044 2552 0162043ff06fc0b7df59995580637c08.exe 29 PID 2552 wrote to memory of 3044 2552 0162043ff06fc0b7df59995580637c08.exe 29 PID 2552 wrote to memory of 3044 2552 0162043ff06fc0b7df59995580637c08.exe 29 PID 2552 wrote to memory of 3044 2552 0162043ff06fc0b7df59995580637c08.exe 29 PID 2552 wrote to memory of 1936 2552 0162043ff06fc0b7df59995580637c08.exe 31 PID 2552 wrote to memory of 1936 2552 0162043ff06fc0b7df59995580637c08.exe 31 PID 2552 wrote to memory of 1936 2552 0162043ff06fc0b7df59995580637c08.exe 31 PID 2552 wrote to memory of 1936 2552 0162043ff06fc0b7df59995580637c08.exe 31 PID 2552 wrote to memory of 2624 2552 0162043ff06fc0b7df59995580637c08.exe 33 PID 2552 wrote to memory of 2624 2552 0162043ff06fc0b7df59995580637c08.exe 33 PID 2552 wrote to memory of 2624 2552 0162043ff06fc0b7df59995580637c08.exe 33 PID 2552 wrote to memory of 2624 2552 0162043ff06fc0b7df59995580637c08.exe 33 PID 2552 wrote to memory of 2700 2552 0162043ff06fc0b7df59995580637c08.exe 35 PID 2552 wrote to memory of 2700 2552 0162043ff06fc0b7df59995580637c08.exe 35 PID 2552 wrote to memory of 2700 2552 0162043ff06fc0b7df59995580637c08.exe 35 PID 2552 wrote to memory of 2700 2552 0162043ff06fc0b7df59995580637c08.exe 35 PID 2552 wrote to memory of 2724 2552 0162043ff06fc0b7df59995580637c08.exe 37 PID 2552 wrote to memory of 2724 2552 0162043ff06fc0b7df59995580637c08.exe 37 PID 2552 wrote to memory of 2724 2552 0162043ff06fc0b7df59995580637c08.exe 37 PID 2552 wrote to memory of 2724 2552 0162043ff06fc0b7df59995580637c08.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0162043ff06fc0b7df59995580637c08.exe"C:\Users\Admin\AppData\Local\Temp\0162043ff06fc0b7df59995580637c08.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zuzzcjiq\2⤵PID:3044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mwrmddwc.exe" C:\Windows\SysWOW64\zuzzcjiq\2⤵PID:1936
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zuzzcjiq binPath= "C:\Windows\SysWOW64\zuzzcjiq\mwrmddwc.exe /d\"C:\Users\Admin\AppData\Local\Temp\0162043ff06fc0b7df59995580637c08.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2624
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zuzzcjiq "wifi internet conection"2⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zuzzcjiq2⤵
- Launches sc.exe
PID:2724
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2736
-
-
C:\Windows\SysWOW64\zuzzcjiq\mwrmddwc.exeC:\Windows\SysWOW64\zuzzcjiq\mwrmddwc.exe /d"C:\Users\Admin\AppData\Local\Temp\0162043ff06fc0b7df59995580637c08.exe"1⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1780
-