Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
20f0c29b9cee60d6a40a0bfc2a942d11.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20f0c29b9cee60d6a40a0bfc2a942d11.exe
Resource
win10v2004-20231215-en
General
-
Target
20f0c29b9cee60d6a40a0bfc2a942d11.exe
-
Size
414KB
-
MD5
20f0c29b9cee60d6a40a0bfc2a942d11
-
SHA1
682f1f99edb0e74b26f0f6fda255cce9e24c4211
-
SHA256
1ea24803aec7be812001df5509285b29f3c963e1604c55b2957443212937f847
-
SHA512
c7fe2e9323ce0160f691e1bb6ed74abf0f5355a241373ab48378f02b2a96afa7be08d840c8bec1e33195cef94f08c3b646abbd3b85fc2536bb2d71667452560b
-
SSDEEP
6144:r5CFwkrdy8ly0ZYv5b234BBWDoP1e6AqCJsaE+N8PVT5BcOsi:d+widyjEYv5b2IADoP15J4YBBr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2452 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1976 ebsaum.exe -
Loads dropped DLL 2 IoCs
pid Process 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\{40C758C8-CEFB-AD4E-7138-F2B16CEAD1AC} = "C:\\Users\\Admin\\AppData\\Roaming\\Seiqvu\\ebsaum.exe" ebsaum.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe 1976 ebsaum.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 1976 ebsaum.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1976 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 28 PID 2296 wrote to memory of 1976 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 28 PID 2296 wrote to memory of 1976 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 28 PID 2296 wrote to memory of 1976 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 28 PID 1976 wrote to memory of 1076 1976 ebsaum.exe 11 PID 1976 wrote to memory of 1076 1976 ebsaum.exe 11 PID 1976 wrote to memory of 1076 1976 ebsaum.exe 11 PID 1976 wrote to memory of 1076 1976 ebsaum.exe 11 PID 1976 wrote to memory of 1076 1976 ebsaum.exe 11 PID 1976 wrote to memory of 1140 1976 ebsaum.exe 10 PID 1976 wrote to memory of 1140 1976 ebsaum.exe 10 PID 1976 wrote to memory of 1140 1976 ebsaum.exe 10 PID 1976 wrote to memory of 1140 1976 ebsaum.exe 10 PID 1976 wrote to memory of 1140 1976 ebsaum.exe 10 PID 1976 wrote to memory of 1196 1976 ebsaum.exe 8 PID 1976 wrote to memory of 1196 1976 ebsaum.exe 8 PID 1976 wrote to memory of 1196 1976 ebsaum.exe 8 PID 1976 wrote to memory of 1196 1976 ebsaum.exe 8 PID 1976 wrote to memory of 1196 1976 ebsaum.exe 8 PID 1976 wrote to memory of 1580 1976 ebsaum.exe 3 PID 1976 wrote to memory of 1580 1976 ebsaum.exe 3 PID 1976 wrote to memory of 1580 1976 ebsaum.exe 3 PID 1976 wrote to memory of 1580 1976 ebsaum.exe 3 PID 1976 wrote to memory of 1580 1976 ebsaum.exe 3 PID 1976 wrote to memory of 2296 1976 ebsaum.exe 16 PID 1976 wrote to memory of 2296 1976 ebsaum.exe 16 PID 1976 wrote to memory of 2296 1976 ebsaum.exe 16 PID 1976 wrote to memory of 2296 1976 ebsaum.exe 16 PID 1976 wrote to memory of 2296 1976 ebsaum.exe 16 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29 PID 2296 wrote to memory of 2452 2296 20f0c29b9cee60d6a40a0bfc2a942d11.exe 29
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1580
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\20f0c29b9cee60d6a40a0bfc2a942d11.exe"C:\Users\Admin\AppData\Local\Temp\20f0c29b9cee60d6a40a0bfc2a942d11.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Roaming\Seiqvu\ebsaum.exe"C:\Users\Admin\AppData\Roaming\Seiqvu\ebsaum.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp75ded9be.bat"3⤵
- Deletes itself
PID:2452
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1140
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD56f100e414620823fabd32b2f6c12294d
SHA16088b10f2dcfc70c373740477dfc0feabb9da87e
SHA256a1f864471a444c675845ff2ff43289fff31803534d98d585cd00a9e3d8fd16b9
SHA512d4ac533ba2ac6dd4f4ef6c3863f1ab15ddd6e8f4ce5985823cfae789c76d64f83e7e360f1d61565151aeb4dfdbb11b0fbe91e7a81c6100425d3cdfe92bfca048