Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
1d7eaebfd2a61cec5b8701148f4226b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d7eaebfd2a61cec5b8701148f4226b3.exe
Resource
win10v2004-20231215-en
General
-
Target
1d7eaebfd2a61cec5b8701148f4226b3.exe
-
Size
13.6MB
-
MD5
1d7eaebfd2a61cec5b8701148f4226b3
-
SHA1
d6a2723b8007f0bd295d2243c9ecaa6e73decadc
-
SHA256
05a8af759237e4c4b84f685669ac722006c97938991fadd34ec9bbd0ef2d58e2
-
SHA512
6d0b45dce771065609467f89d294f4500314c1fbf37c21a214f415ad8aa79b7773bdaf1119e8f5130e385906c2094c1e697661e336567424776fa6863a727f9b
-
SSDEEP
49152:6j5555555555555555555555555555555555555555555555555555555555555t:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\zexvrppt = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2612 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\zexvrppt\ImagePath = "C:\\Windows\\SysWOW64\\zexvrppt\\sftwyywj.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2716 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 sftwyywj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 2716 2744 sftwyywj.exe 39 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2000 sc.exe 2920 sc.exe 2848 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2020 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 28 PID 2968 wrote to memory of 2020 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 28 PID 2968 wrote to memory of 2020 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 28 PID 2968 wrote to memory of 2020 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 28 PID 2968 wrote to memory of 1804 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 30 PID 2968 wrote to memory of 1804 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 30 PID 2968 wrote to memory of 1804 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 30 PID 2968 wrote to memory of 1804 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 30 PID 2968 wrote to memory of 2000 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 32 PID 2968 wrote to memory of 2000 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 32 PID 2968 wrote to memory of 2000 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 32 PID 2968 wrote to memory of 2000 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 32 PID 2968 wrote to memory of 2920 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 34 PID 2968 wrote to memory of 2920 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 34 PID 2968 wrote to memory of 2920 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 34 PID 2968 wrote to memory of 2920 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 34 PID 2968 wrote to memory of 2848 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 37 PID 2968 wrote to memory of 2848 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 37 PID 2968 wrote to memory of 2848 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 37 PID 2968 wrote to memory of 2848 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 37 PID 2744 wrote to memory of 2716 2744 sftwyywj.exe 39 PID 2744 wrote to memory of 2716 2744 sftwyywj.exe 39 PID 2744 wrote to memory of 2716 2744 sftwyywj.exe 39 PID 2744 wrote to memory of 2716 2744 sftwyywj.exe 39 PID 2744 wrote to memory of 2716 2744 sftwyywj.exe 39 PID 2744 wrote to memory of 2716 2744 sftwyywj.exe 39 PID 2968 wrote to memory of 2612 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 41 PID 2968 wrote to memory of 2612 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 41 PID 2968 wrote to memory of 2612 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 41 PID 2968 wrote to memory of 2612 2968 1d7eaebfd2a61cec5b8701148f4226b3.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d7eaebfd2a61cec5b8701148f4226b3.exe"C:\Users\Admin\AppData\Local\Temp\1d7eaebfd2a61cec5b8701148f4226b3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zexvrppt\2⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\sftwyywj.exe" C:\Windows\SysWOW64\zexvrppt\2⤵PID:1804
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zexvrppt binPath= "C:\Windows\SysWOW64\zexvrppt\sftwyywj.exe /d\"C:\Users\Admin\AppData\Local\Temp\1d7eaebfd2a61cec5b8701148f4226b3.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2000
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zexvrppt "wifi internet conection"2⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zexvrppt2⤵
- Launches sc.exe
PID:2848
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2612
-
-
C:\Windows\SysWOW64\zexvrppt\sftwyywj.exeC:\Windows\SysWOW64\zexvrppt\sftwyywj.exe /d"C:\Users\Admin\AppData\Local\Temp\1d7eaebfd2a61cec5b8701148f4226b3.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.1MB
MD598b3d025bd764ae8cd4a24ee20e1b9e7
SHA190bd2b959b7a757132ff15c83665c849d2c0793e
SHA2560530f4dbede3fd7d506bc9700d525e8323698c23a848b0ff50dc08c1e23f137e
SHA512b0953adce037694c10dea6d90ab37e0db60d76aec1d471329d4d3b3a39b8b820d5a13d8b78c4bf23f3e1ee7783992e7cdf7c35e4f81acb40d2ca9012f7f72981
-
Filesize
5.0MB
MD5fec98ded28d626204f602b68640cb4de
SHA1961d12a0fe95ffca28262e6969df7b0c7098d240
SHA256d1d759cd34d65c5a929e832c9652de5aa50de057877d43277087e9b9b97f14c4
SHA512c01aca3b6a23e2834fb8aaf62b5cbbc02956f015552fa22d03dd07023676374ad5cf5636a96a639590cc91b6d8ca5d6fed92bb19b099d0687c46adce0de45d20