Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 21:58
Behavioral task
behavioral1
Sample
4202364da06c9f7e07177ce3d08e9124.exe
Resource
win7-20231129-en
General
-
Target
4202364da06c9f7e07177ce3d08e9124.exe
-
Size
536KB
-
MD5
4202364da06c9f7e07177ce3d08e9124
-
SHA1
653c2fc6d58dd404bd2f2b02dcb5d7e6514b3853
-
SHA256
92faa5aaeef3e16afe8a8f6e41d7b33d0993674c0629e2011e35aa643aa941e8
-
SHA512
1b5867253f2f0c4df6f7242a4c971ef5c0b590cfb59a68071e1cdd7ba2bb726f7ed2d32f672467398fd5f39b61b2278040d9ec9cd43ec2a497866c0127fee1fb
-
SSDEEP
12288:q0nPhglq2Uyt4R/b2G/0hznQGoexBU/NPM:q0P/k4lb2wKatM
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
pid Process 2140 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1892 zadoa.exe 1676 xuhuu.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 4202364da06c9f7e07177ce3d08e9124.exe 1892 zadoa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe 1676 xuhuu.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1892 2932 4202364da06c9f7e07177ce3d08e9124.exe 28 PID 2932 wrote to memory of 1892 2932 4202364da06c9f7e07177ce3d08e9124.exe 28 PID 2932 wrote to memory of 1892 2932 4202364da06c9f7e07177ce3d08e9124.exe 28 PID 2932 wrote to memory of 1892 2932 4202364da06c9f7e07177ce3d08e9124.exe 28 PID 2932 wrote to memory of 2140 2932 4202364da06c9f7e07177ce3d08e9124.exe 29 PID 2932 wrote to memory of 2140 2932 4202364da06c9f7e07177ce3d08e9124.exe 29 PID 2932 wrote to memory of 2140 2932 4202364da06c9f7e07177ce3d08e9124.exe 29 PID 2932 wrote to memory of 2140 2932 4202364da06c9f7e07177ce3d08e9124.exe 29 PID 1892 wrote to memory of 1676 1892 zadoa.exe 33 PID 1892 wrote to memory of 1676 1892 zadoa.exe 33 PID 1892 wrote to memory of 1676 1892 zadoa.exe 33 PID 1892 wrote to memory of 1676 1892 zadoa.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4202364da06c9f7e07177ce3d08e9124.exe"C:\Users\Admin\AppData\Local\Temp\4202364da06c9f7e07177ce3d08e9124.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\zadoa.exe"C:\Users\Admin\AppData\Local\Temp\zadoa.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\xuhuu.exe"C:\Users\Admin\AppData\Local\Temp\xuhuu.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5ac6171de4d6bd6f99ab4476752054e16
SHA104bd0acc8e08cf2d20fd67e3ad54e37fa6886f54
SHA25613ced25e841f0da703fcbbfdd71b30ff15c3372f4b58076a44189e7113294c94
SHA512db7ada78004bf35e3b631337036e1fe8c1ee2db4f6000d7a195fbb8ce61696386e8870311b162003f5b87e40512d98c65d70cabe8fbec5cb25a605fcb5bdecc0
-
Filesize
512B
MD59bc313fe66274602a16016571a45e5d0
SHA154c9cb2647a0dc84a99bb6498b8a85a37548027a
SHA2569a269a583198f15ff67468f17fd563b5f62341c4cde1bae8f70db73f22258466
SHA51252d0997e90763b5f08393b960846af46d3b44c5d171dd8ff334a3416f256ca9c9a37ace57aed8d48d591f7b25a6664aa4d0ef1318e6bef8cbaa9319b59621b21
-
Filesize
118KB
MD5985c5e6bd5d118fb082b5fe4907b2d5d
SHA17da81147938b02950039b7ce4a23d7d8471451c7
SHA2565badb5ffd9b7c17c78ca04a361cdddea42c652c27c84cdc24d43ad57860e3550
SHA51265ed48b5e78b329745e549f50dcce25106ae23a8103fc3b9325ceb5b43242466d85c819c2ee34050e0e3f3b37eede28719c66b596755bdd9eab4acc1f11ac65f
-
Filesize
112KB
MD5e3173a9b165172c606613f04c30aca85
SHA14407b3d8df96d38a94b5177ca1b4040071e3d5a8
SHA256d24a3455d8b5b779265571be45e191e61b23a89c7f2393ebb92557cba88085c4
SHA512235cc073a440ae72ad6cb05b8053cd8f094d02584a0ff290ce869654f617d83bce128c9e850b16429804bd9e8a5d796b895b92dc30c2c8526e42935c79385283
-
Filesize
536KB
MD52c610dfa567ce786aaee324047fd08d5
SHA1231b537de6b012fdfbeb85e80bcd7c327a55bc58
SHA2561d9320b46f66c3efff30ce449208e6087b018d2a107066828229b170415f8689
SHA5120f0e09a3ec97e334c4479e2eaa37ffc622b64f6868e8e9db813b47a529642ede53d3d0160642f64ee578627d35f17918b7c390a58abad73e568e47608b1444ae