Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:15
Behavioral task
behavioral1
Sample
299aba363caef390fbc4bd35f09718dd.exe
Resource
win7-20231215-en
General
-
Target
299aba363caef390fbc4bd35f09718dd.exe
-
Size
401KB
-
MD5
299aba363caef390fbc4bd35f09718dd
-
SHA1
86cc9f5714875325e3f582176cf50e1d2b6887ba
-
SHA256
c9a7fbc74f14fd0561ba21366dbf3f0b053bc65bc078622c61b2881cadbc47e9
-
SHA512
7071f458001f56b80bdfcd4ff5ed3a036d48f7ce26f5b5cc9aecb8b45fb1b3d112c94e345682e8f250a8d97529bae56e3227b5786f57a065e26ff1cae9d60272
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrohJh:8IfBoDWoyFblU6hAJQnOTh
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2464 dabuu.exe 2712 logupy.exe 1008 dogux.exe -
Loads dropped DLL 5 IoCs
pid Process 2416 299aba363caef390fbc4bd35f09718dd.exe 2416 299aba363caef390fbc4bd35f09718dd.exe 2464 dabuu.exe 2464 dabuu.exe 2712 logupy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe 1008 dogux.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2464 2416 299aba363caef390fbc4bd35f09718dd.exe 28 PID 2416 wrote to memory of 2464 2416 299aba363caef390fbc4bd35f09718dd.exe 28 PID 2416 wrote to memory of 2464 2416 299aba363caef390fbc4bd35f09718dd.exe 28 PID 2416 wrote to memory of 2464 2416 299aba363caef390fbc4bd35f09718dd.exe 28 PID 2416 wrote to memory of 2700 2416 299aba363caef390fbc4bd35f09718dd.exe 30 PID 2416 wrote to memory of 2700 2416 299aba363caef390fbc4bd35f09718dd.exe 30 PID 2416 wrote to memory of 2700 2416 299aba363caef390fbc4bd35f09718dd.exe 30 PID 2416 wrote to memory of 2700 2416 299aba363caef390fbc4bd35f09718dd.exe 30 PID 2464 wrote to memory of 2712 2464 dabuu.exe 31 PID 2464 wrote to memory of 2712 2464 dabuu.exe 31 PID 2464 wrote to memory of 2712 2464 dabuu.exe 31 PID 2464 wrote to memory of 2712 2464 dabuu.exe 31 PID 2712 wrote to memory of 1008 2712 logupy.exe 34 PID 2712 wrote to memory of 1008 2712 logupy.exe 34 PID 2712 wrote to memory of 1008 2712 logupy.exe 34 PID 2712 wrote to memory of 1008 2712 logupy.exe 34 PID 2712 wrote to memory of 1480 2712 logupy.exe 36 PID 2712 wrote to memory of 1480 2712 logupy.exe 36 PID 2712 wrote to memory of 1480 2712 logupy.exe 36 PID 2712 wrote to memory of 1480 2712 logupy.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\299aba363caef390fbc4bd35f09718dd.exe"C:\Users\Admin\AppData\Local\Temp\299aba363caef390fbc4bd35f09718dd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\dabuu.exe"C:\Users\Admin\AppData\Local\Temp\dabuu.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\logupy.exe"C:\Users\Admin\AppData\Local\Temp\logupy.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\dogux.exe"C:\Users\Admin\AppData\Local\Temp\dogux.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1480
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5976952907df353c96bb613452ea44e38
SHA108d9fddb1669416ee42450f6490b4682ae959d29
SHA256133082ad05099c6b3fe437fd721c803ef2584675b551f47621988b5e1b0e147f
SHA512429f3365ab05cc734fb47a7915b593c415e43bf49b2d28bc261650d38c8e91a6d4abc951cd31e5f95de06d76a57c654b0bd230b25c08a801fdeda6f7f09403a3
-
Filesize
276B
MD5d09c340f1023c63586b0641d474fca43
SHA1f9e24d347c02dcc2d777bc04ad90f851e7c62e84
SHA2566bda78e59089c39a9b62703fdaec529efa0241f767db7aa29b891eba29cd9905
SHA512cf3a0e1a272ad106e4a07ffc527b17c419fc2710cc3b256b8699edd292fdf0971bf73426ce45493d090b0f0ea3c3cef5e16a909ef5ccafeb33ffe43b79481f31
-
Filesize
401KB
MD524b1b20282bd9c6297667008c937f3d0
SHA1c1faec7c1687535e3698abf87ae0969928c8bc63
SHA256e97515c5a68bd68e2358f4d6027584c6322674dec3064eecdbf3ee44d919f244
SHA512879df201676ee8b98f8a184eb01743e8f5e4415ff36100f4979e9aa120987e1cf94fc6458d292a8507e50ec026de8ea701ed6b5d04f56d1d6565e38bd9b8b0d4
-
Filesize
401KB
MD5d0eb53e4b662ab38004f1d60021b7e0d
SHA1b9cf434c4d928bbe54ca50f1c39570a2f298043b
SHA256087487db06b76c5076ec5e875e0f6aef7f6fd98504471421a6108ce74a046c26
SHA512dede7d0ed905055a2d70a85e207677a01e32ca22c8f952f7eb65fca21b507bc336888e3b75ac2c2582c8898a85705b1e063329a0aa6a7fd8a4270c101785ea3c
-
Filesize
223KB
MD55fde4f7de949145658790ec725b0e7bd
SHA1c7bf98137907a73319b2c6c9c72ce9780a555628
SHA2566520bb8af271185e91d4bc1ad4c325720423ccb78b7df43a38f4dabb38e5e5e1
SHA51270eae0be96cbb7ec0344ff2a357736630c393365f0d84f8bf5eb323705e5491d2303ff6a592a66319206475946fa5ab987b104c03e917247d6c697080497b451