Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:55
Behavioral task
behavioral1
Sample
2907b7fe7f8d7ec72b908c60159513ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2907b7fe7f8d7ec72b908c60159513ee.exe
Resource
win10v2004-20231215-en
General
-
Target
2907b7fe7f8d7ec72b908c60159513ee.exe
-
Size
306KB
-
MD5
2907b7fe7f8d7ec72b908c60159513ee
-
SHA1
1d2fef5eeddce1f3024abf039e30a905ee63d14b
-
SHA256
5e1d3efaabff8d2c4bf429477b644ca530e64d8ccf651a6addbf45911fa5e221
-
SHA512
83a346cb6d02812093a49dc0d7e744429d4911b30284dc74dee7eb711ab41a77cb1ccc332e095db6bc8c92b6dc54e98e86829634958ddfd19b84b077308a6ef2
-
SSDEEP
6144:JXAUj2iFDTiGwPw+rfJohCv0rVRSPjd53Z/N87X7b3vbcfkkYqaQ/jQ:JLjpFDTiGwPNdohDSPDbELb3YMkYza
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 omyf.exe -
Loads dropped DLL 2 IoCs
pid Process 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 2964 2907b7fe7f8d7ec72b908c60159513ee.exe -
resource yara_rule behavioral1/memory/2964-0-0x0000000000400000-0x000000000082E000-memory.dmp upx behavioral1/files/0x0030000000016d2f-14.dat upx behavioral1/files/0x0030000000016d2f-10.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\{94926AC8-CECC-AD4E-05C4-B4AE0A3C97B3} = "C:\\Users\\Admin\\AppData\\Roaming\\Ojupak\\omyf.exe" omyf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2964 set thread context of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Privacy 2907b7fe7f8d7ec72b908c60159513ee.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 2907b7fe7f8d7ec72b908c60159513ee.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe 2216 omyf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2964 2907b7fe7f8d7ec72b908c60159513ee.exe Token: SeSecurityPrivilege 2964 2907b7fe7f8d7ec72b908c60159513ee.exe Token: SeSecurityPrivilege 2964 2907b7fe7f8d7ec72b908c60159513ee.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2216 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 30 PID 2964 wrote to memory of 2216 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 30 PID 2964 wrote to memory of 2216 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 30 PID 2964 wrote to memory of 2216 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 30 PID 2216 wrote to memory of 1116 2216 omyf.exe 9 PID 2216 wrote to memory of 1116 2216 omyf.exe 9 PID 2216 wrote to memory of 1116 2216 omyf.exe 9 PID 2216 wrote to memory of 1116 2216 omyf.exe 9 PID 2216 wrote to memory of 1116 2216 omyf.exe 9 PID 2216 wrote to memory of 1176 2216 omyf.exe 8 PID 2216 wrote to memory of 1176 2216 omyf.exe 8 PID 2216 wrote to memory of 1176 2216 omyf.exe 8 PID 2216 wrote to memory of 1176 2216 omyf.exe 8 PID 2216 wrote to memory of 1176 2216 omyf.exe 8 PID 2216 wrote to memory of 1220 2216 omyf.exe 7 PID 2216 wrote to memory of 1220 2216 omyf.exe 7 PID 2216 wrote to memory of 1220 2216 omyf.exe 7 PID 2216 wrote to memory of 1220 2216 omyf.exe 7 PID 2216 wrote to memory of 1220 2216 omyf.exe 7 PID 2216 wrote to memory of 1668 2216 omyf.exe 5 PID 2216 wrote to memory of 1668 2216 omyf.exe 5 PID 2216 wrote to memory of 1668 2216 omyf.exe 5 PID 2216 wrote to memory of 1668 2216 omyf.exe 5 PID 2216 wrote to memory of 1668 2216 omyf.exe 5 PID 2216 wrote to memory of 2964 2216 omyf.exe 1 PID 2216 wrote to memory of 2964 2216 omyf.exe 1 PID 2216 wrote to memory of 2964 2216 omyf.exe 1 PID 2216 wrote to memory of 2964 2216 omyf.exe 1 PID 2216 wrote to memory of 2964 2216 omyf.exe 1 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28 PID 2964 wrote to memory of 748 2964 2907b7fe7f8d7ec72b908c60159513ee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2907b7fe7f8d7ec72b908c60159513ee.exe"C:\Users\Admin\AppData\Local\Temp\2907b7fe7f8d7ec72b908c60159513ee.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb2372023.bat"2⤵
- Deletes itself
PID:748
-
-
C:\Users\Admin\AppData\Roaming\Ojupak\omyf.exe"C:\Users\Admin\AppData\Roaming\Ojupak\omyf.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1668
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD531463319e88c8fb82805f7a242f54564
SHA17167b60328b706040d8eb66a9c394928f407c9ab
SHA25664a12614d92d3e8a2b04dbd8ca8ff8da8fcb6e04d24d515f6c5ceb15631c6e7a
SHA512f2ec92013547b434a942dd42f41eeedee2a3a56f225589fac0541c43efc1bf437908f39c48509f37bca7616f21298988327948bfad984d61fe0d72781daee219