Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
489a9acbbdaac7c39af4ea99f19152e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
489a9acbbdaac7c39af4ea99f19152e5.exe
Resource
win10v2004-20231222-en
General
-
Target
489a9acbbdaac7c39af4ea99f19152e5.exe
-
Size
138KB
-
MD5
489a9acbbdaac7c39af4ea99f19152e5
-
SHA1
80a9479b5f1c966e625442884779a4a54b69d075
-
SHA256
d84e4899b80da7e70fd68cc898874b5a61fd51ad4f1169ef60cdd0089bddd4e1
-
SHA512
b407256f6623e44fab329f2f2e6a767663666d7400a3adbbaa925263a93c54343ca1134ac0258fad5cb7e895b2df6bb9362cf73a06b96478413a57287066b341
-
SSDEEP
3072:V9kx7xWEd5JPjgfPUH0/UVTgSDZ5TCQ3lH9P6bef:V9kx7MEd7g0H0/UZgSd5TBVH9Sbe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1108 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 arup.exe -
Loads dropped DLL 2 IoCs
pid Process 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 2448 489a9acbbdaac7c39af4ea99f19152e5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\{8FFFFFEA-EEF6-C009-2BD1-235A622C59AD} = "C:\\Users\\Admin\\AppData\\Roaming\\Mifoi\\arup.exe" arup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2448 set thread context of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy 489a9acbbdaac7c39af4ea99f19152e5.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 489a9acbbdaac7c39af4ea99f19152e5.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\0C3E50AD-00000001.eml:OECustomProperty WinMail.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe 2704 arup.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2448 489a9acbbdaac7c39af4ea99f19152e5.exe Token: SeSecurityPrivilege 2448 489a9acbbdaac7c39af4ea99f19152e5.exe Token: SeSecurityPrivilege 2448 489a9acbbdaac7c39af4ea99f19152e5.exe Token: SeManageVolumePrivilege 1720 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1720 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1980 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 28 PID 2448 wrote to memory of 1980 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 28 PID 2448 wrote to memory of 1980 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 28 PID 2448 wrote to memory of 1980 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 28 PID 1980 wrote to memory of 2748 1980 net.exe 30 PID 1980 wrote to memory of 2748 1980 net.exe 30 PID 1980 wrote to memory of 2748 1980 net.exe 30 PID 1980 wrote to memory of 2748 1980 net.exe 30 PID 2448 wrote to memory of 2764 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 31 PID 2448 wrote to memory of 2764 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 31 PID 2448 wrote to memory of 2764 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 31 PID 2448 wrote to memory of 2764 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 31 PID 2764 wrote to memory of 2940 2764 net.exe 33 PID 2764 wrote to memory of 2940 2764 net.exe 33 PID 2764 wrote to memory of 2940 2764 net.exe 33 PID 2764 wrote to memory of 2940 2764 net.exe 33 PID 2448 wrote to memory of 2704 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 34 PID 2448 wrote to memory of 2704 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 34 PID 2448 wrote to memory of 2704 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 34 PID 2448 wrote to memory of 2704 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 34 PID 2704 wrote to memory of 2904 2704 arup.exe 35 PID 2704 wrote to memory of 2904 2704 arup.exe 35 PID 2704 wrote to memory of 2904 2704 arup.exe 35 PID 2704 wrote to memory of 2904 2704 arup.exe 35 PID 2904 wrote to memory of 2572 2904 net.exe 37 PID 2904 wrote to memory of 2572 2904 net.exe 37 PID 2904 wrote to memory of 2572 2904 net.exe 37 PID 2904 wrote to memory of 2572 2904 net.exe 37 PID 2704 wrote to memory of 2712 2704 arup.exe 38 PID 2704 wrote to memory of 2712 2704 arup.exe 38 PID 2704 wrote to memory of 2712 2704 arup.exe 38 PID 2704 wrote to memory of 2712 2704 arup.exe 38 PID 2704 wrote to memory of 1140 2704 arup.exe 12 PID 2704 wrote to memory of 1140 2704 arup.exe 12 PID 2704 wrote to memory of 1140 2704 arup.exe 12 PID 2712 wrote to memory of 2600 2712 net.exe 40 PID 2712 wrote to memory of 2600 2712 net.exe 40 PID 2712 wrote to memory of 2600 2712 net.exe 40 PID 2712 wrote to memory of 2600 2712 net.exe 40 PID 2704 wrote to memory of 1140 2704 arup.exe 12 PID 2704 wrote to memory of 1140 2704 arup.exe 12 PID 2704 wrote to memory of 1220 2704 arup.exe 19 PID 2704 wrote to memory of 1220 2704 arup.exe 19 PID 2704 wrote to memory of 1220 2704 arup.exe 19 PID 2704 wrote to memory of 1220 2704 arup.exe 19 PID 2704 wrote to memory of 1220 2704 arup.exe 19 PID 2704 wrote to memory of 1260 2704 arup.exe 18 PID 2704 wrote to memory of 1260 2704 arup.exe 18 PID 2704 wrote to memory of 1260 2704 arup.exe 18 PID 2704 wrote to memory of 1260 2704 arup.exe 18 PID 2704 wrote to memory of 1260 2704 arup.exe 18 PID 2704 wrote to memory of 2448 2704 arup.exe 27 PID 2704 wrote to memory of 2448 2704 arup.exe 27 PID 2704 wrote to memory of 2448 2704 arup.exe 27 PID 2704 wrote to memory of 2448 2704 arup.exe 27 PID 2704 wrote to memory of 2448 2704 arup.exe 27 PID 2448 wrote to memory of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42 PID 2448 wrote to memory of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42 PID 2448 wrote to memory of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42 PID 2448 wrote to memory of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42 PID 2448 wrote to memory of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42 PID 2448 wrote to memory of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42 PID 2448 wrote to memory of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42 PID 2448 wrote to memory of 1108 2448 489a9acbbdaac7c39af4ea99f19152e5.exe 42
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1140
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\489a9acbbdaac7c39af4ea99f19152e5.exe"C:\Users\Admin\AppData\Local\Temp\489a9acbbdaac7c39af4ea99f19152e5.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:2748
-
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2940
-
-
-
C:\Users\Admin\AppData\Roaming\Mifoi\arup.exe"C:\Users\Admin\AppData\Roaming\Mifoi\arup.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net.exenet stop wscsvc4⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc5⤵PID:2572
-
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess5⤵PID:2600
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp330883d4.bat"3⤵
- Deletes itself
PID:1108
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1220
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1720
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:768
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5188a07a8be3eaaf181e5a52841592770
SHA1828788f0f5f5b85d62496f4691990c08496f35e8
SHA256d46b2f37ca407d1891dbdbd446095245208b16ea5d540dd791e55863fc9373e3
SHA51233309b736860e743f7e086e6bbefc3d4709fd1add8fbbd032066e9e6237113738efc5a9d6edb438c1b6c4abf436d6aac5e2e53badd658b1dd593f9af340f06ae
-
Filesize
243B
MD577d25cb7f8021f3b7f8112c5f0b41366
SHA10a6855f9f7dce0954b586ee227620512c9c52332
SHA256d62fc66912bc1c684760d5d134704fb1b7bcf1e078be75c9a5ce4dbd521acad4
SHA512a4d3661a7712c8601e8c355835956b8901c5d344d85544a44d8baea7a15a445bd6213e1eaa2399f6f57f3ff420fe1e569f7a59fb4ba789ced0fd35aa91366877
-
Filesize
366B
MD510e87b42065a28df0ab43f52c79682ad
SHA1b0ba0ce0bdd148a2d38004afa99f4cb398ab17d1
SHA2560e799d7a9d282a5e2c80f1ed10552f97f3bd6f1351239456d37382be47187f86
SHA5123ddbfa0513b0a5510bfe34da11325be8c296e40158ecc078c3859c847beff55c4241e35b4b8344c63898b53aed701f75446ca80ce062908cbcf487107de04b78
-
Filesize
138KB
MD50b2387aa7e14229424ec5bd8273ead90
SHA10e6349645fe2080d6ef99a87dc95c8aa7b55c6b6
SHA256dcb92321395bbe86fe0639d83b7a304e5d584beb77ae7466cd1ec142bff4c25f
SHA5128046e6c661471441ea971bc37bbdc86e1ab1daf9a920da3d0eb367e32b1e9167c13953684c16846a12bc27afff4ee8ec0066a3c947aa801ed857e87f8cd484d7