Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
027389c20d92aabc4084188a7896983b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
027389c20d92aabc4084188a7896983b.exe
Resource
win10v2004-20231215-en
General
-
Target
027389c20d92aabc4084188a7896983b.exe
-
Size
306KB
-
MD5
027389c20d92aabc4084188a7896983b
-
SHA1
a61aa306d4c4fdd915a9b01e0ecd5aa5cb6aa3df
-
SHA256
23cc50e5f7806dc0153ddd81ea6e60f339c1e8f08530648bf2c891539a338e5b
-
SHA512
a3530cc7570dc3f1d574a353e324413a7679dc3debeb9a533934decb6a845f0e9a52db64935fea15b2f405f2e910e22995d6fa74183c4662067dff0361a63318
-
SSDEEP
6144:dZdK4d8HTqfyYbqkqrd/QO9qqXPNNyAzG9T7kVkU/5:dnKE8HDrR4O9qqfGAUT7kiU/5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 ahpila.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 027389c20d92aabc4084188a7896983b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E705BD28-DA76-AD4E-D262-B4D1F82197CC} = "C:\\Users\\Admin\\AppData\\Roaming\\Unak\\ahpila.exe" ahpila.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 -
Program crash 1 IoCs
pid pid_target Process procid_target 1576 1600 WerFault.exe 16 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Privacy 027389c20d92aabc4084188a7896983b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 027389c20d92aabc4084188a7896983b.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe 3040 ahpila.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2872 027389c20d92aabc4084188a7896983b.exe 3040 ahpila.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3040 2872 027389c20d92aabc4084188a7896983b.exe 19 PID 2872 wrote to memory of 3040 2872 027389c20d92aabc4084188a7896983b.exe 19 PID 2872 wrote to memory of 3040 2872 027389c20d92aabc4084188a7896983b.exe 19 PID 2872 wrote to memory of 3040 2872 027389c20d92aabc4084188a7896983b.exe 19 PID 3040 wrote to memory of 1284 3040 ahpila.exe 9 PID 3040 wrote to memory of 1284 3040 ahpila.exe 9 PID 3040 wrote to memory of 1284 3040 ahpila.exe 9 PID 3040 wrote to memory of 1284 3040 ahpila.exe 9 PID 3040 wrote to memory of 1284 3040 ahpila.exe 9 PID 3040 wrote to memory of 1348 3040 ahpila.exe 8 PID 3040 wrote to memory of 1348 3040 ahpila.exe 8 PID 3040 wrote to memory of 1348 3040 ahpila.exe 8 PID 3040 wrote to memory of 1348 3040 ahpila.exe 8 PID 3040 wrote to memory of 1348 3040 ahpila.exe 8 PID 3040 wrote to memory of 1380 3040 ahpila.exe 7 PID 3040 wrote to memory of 1380 3040 ahpila.exe 7 PID 3040 wrote to memory of 1380 3040 ahpila.exe 7 PID 3040 wrote to memory of 1380 3040 ahpila.exe 7 PID 3040 wrote to memory of 1380 3040 ahpila.exe 7 PID 3040 wrote to memory of 968 3040 ahpila.exe 5 PID 3040 wrote to memory of 968 3040 ahpila.exe 5 PID 3040 wrote to memory of 968 3040 ahpila.exe 5 PID 3040 wrote to memory of 968 3040 ahpila.exe 5 PID 3040 wrote to memory of 968 3040 ahpila.exe 5 PID 3040 wrote to memory of 2872 3040 ahpila.exe 1 PID 3040 wrote to memory of 2872 3040 ahpila.exe 1 PID 3040 wrote to memory of 2872 3040 ahpila.exe 1 PID 3040 wrote to memory of 2872 3040 ahpila.exe 1 PID 3040 wrote to memory of 2872 3040 ahpila.exe 1 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 2872 wrote to memory of 1600 2872 027389c20d92aabc4084188a7896983b.exe 16 PID 1600 wrote to memory of 1576 1600 cmd.exe 17 PID 1600 wrote to memory of 1576 1600 cmd.exe 17 PID 1600 wrote to memory of 1576 1600 cmd.exe 17 PID 1600 wrote to memory of 1576 1600 cmd.exe 17 PID 3040 wrote to memory of 1540 3040 ahpila.exe 18 PID 3040 wrote to memory of 1540 3040 ahpila.exe 18 PID 3040 wrote to memory of 1540 3040 ahpila.exe 18 PID 3040 wrote to memory of 1540 3040 ahpila.exe 18 PID 3040 wrote to memory of 1540 3040 ahpila.exe 18 PID 3040 wrote to memory of 1576 3040 ahpila.exe 17 PID 3040 wrote to memory of 1576 3040 ahpila.exe 17 PID 3040 wrote to memory of 1576 3040 ahpila.exe 17 PID 3040 wrote to memory of 1576 3040 ahpila.exe 17 PID 3040 wrote to memory of 1576 3040 ahpila.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\027389c20d92aabc4084188a7896983b.exe"C:\Users\Admin\AppData\Local\Temp\027389c20d92aabc4084188a7896983b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp38035e49.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 1123⤵
- Program crash
PID:1576
-
-
-
C:\Users\Admin\AppData\Roaming\Unak\ahpila.exe"C:\Users\Admin\AppData\Roaming\Unak\ahpila.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3040
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:968
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1284
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-180870883311055012991216945513-410131980-55881034612811736411587488342-898865612"1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD58bf6f1a7841cf959d3292078919a6a24
SHA1f8c4cff72de6892d15345b8ae8163145338aafc3
SHA25694d353b1fee8e66ec0c1bbbb3bdd62607c36f00550c82a94e63148e78c952519
SHA51260481b1f0dbc5b7023b3c2554a1b73ff8980979c8e432d81e668998d243fc35150bbc39b2fd69fb1ff75ddd8cf16cc7bc887bff3e850f073ad3fd2e26f206eda
-
Filesize
306KB
MD5f73b6bc586ad3ed93929d930e0833cda
SHA12c98284db992ccbb758077592c8fc885527b0bdb
SHA2561fc468271aa9ebaa5662170eb6aa31fa3747e74e49828765875f852da6dd4fbd
SHA512c30bb225a60c7ad59e0022f3ee3f70690ae140a0e42bb0ca12c6c45494b987fb3c653117593af1087781f64b761d4f0cd7241fc9415eedb2a0a46cd1674c8c27