Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
6744b518ec9ccb2012bdbf736c7e187a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6744b518ec9ccb2012bdbf736c7e187a.exe
Resource
win10v2004-20231215-en
General
-
Target
6744b518ec9ccb2012bdbf736c7e187a.exe
-
Size
13.2MB
-
MD5
6744b518ec9ccb2012bdbf736c7e187a
-
SHA1
2d1197901aca6e7e331319a57ac3eeaf15245731
-
SHA256
74868d600acb1c900eb7643f849d64b4e029a0417d091b1833672bbc0eaf49a1
-
SHA512
d3b84833a751b58d70d3e590df0982c5965d8cfa81bfcce9eeca47dff42355201dc30d396a7ea69ec49823ee874c29ed4bf97a069aeabfe393e45bebc2cd2f77
-
SSDEEP
49152:NgMtttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt1:N
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\cidgxetu = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2688 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\cidgxetu\ImagePath = "C:\\Windows\\SysWOW64\\cidgxetu\\vdswjhqq.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2600 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2612 vdswjhqq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2612 set thread context of 2600 2612 vdswjhqq.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2744 sc.exe 2792 sc.exe 2768 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2696 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 28 PID 1652 wrote to memory of 2696 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 28 PID 1652 wrote to memory of 2696 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 28 PID 1652 wrote to memory of 2696 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 28 PID 1652 wrote to memory of 2716 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 30 PID 1652 wrote to memory of 2716 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 30 PID 1652 wrote to memory of 2716 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 30 PID 1652 wrote to memory of 2716 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 30 PID 1652 wrote to memory of 2744 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 32 PID 1652 wrote to memory of 2744 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 32 PID 1652 wrote to memory of 2744 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 32 PID 1652 wrote to memory of 2744 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 32 PID 1652 wrote to memory of 2792 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 34 PID 1652 wrote to memory of 2792 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 34 PID 1652 wrote to memory of 2792 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 34 PID 1652 wrote to memory of 2792 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 34 PID 1652 wrote to memory of 2768 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 37 PID 1652 wrote to memory of 2768 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 37 PID 1652 wrote to memory of 2768 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 37 PID 1652 wrote to memory of 2768 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 37 PID 1652 wrote to memory of 2688 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 39 PID 1652 wrote to memory of 2688 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 39 PID 1652 wrote to memory of 2688 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 39 PID 1652 wrote to memory of 2688 1652 6744b518ec9ccb2012bdbf736c7e187a.exe 39 PID 2612 wrote to memory of 2600 2612 vdswjhqq.exe 41 PID 2612 wrote to memory of 2600 2612 vdswjhqq.exe 41 PID 2612 wrote to memory of 2600 2612 vdswjhqq.exe 41 PID 2612 wrote to memory of 2600 2612 vdswjhqq.exe 41 PID 2612 wrote to memory of 2600 2612 vdswjhqq.exe 41 PID 2612 wrote to memory of 2600 2612 vdswjhqq.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\6744b518ec9ccb2012bdbf736c7e187a.exe"C:\Users\Admin\AppData\Local\Temp\6744b518ec9ccb2012bdbf736c7e187a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cidgxetu\2⤵PID:2696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vdswjhqq.exe" C:\Windows\SysWOW64\cidgxetu\2⤵PID:2716
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create cidgxetu binPath= "C:\Windows\SysWOW64\cidgxetu\vdswjhqq.exe /d\"C:\Users\Admin\AppData\Local\Temp\6744b518ec9ccb2012bdbf736c7e187a.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2744
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description cidgxetu "wifi internet conection"2⤵
- Launches sc.exe
PID:2792
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start cidgxetu2⤵
- Launches sc.exe
PID:2768
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2688
-
-
C:\Windows\SysWOW64\cidgxetu\vdswjhqq.exeC:\Windows\SysWOW64\cidgxetu\vdswjhqq.exe /d"C:\Users\Admin\AppData\Local\Temp\6744b518ec9ccb2012bdbf736c7e187a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD53b8354bcd1482bcf34d2449fbea3d85b
SHA18cce96fdcdafc398e1e16902711283910df589af
SHA256b40bbff690db1128ac9c5491faaf02e3d5ef5f8af17f8beea0b0f38103135976
SHA5129fa88832b124047e2df0a31a850ed49d69e4cbd633166c7070d5680c669d3e192a07ca737153dc15058111248cb8f766908aac8b0a33d008f78c19ad492f4dc8
-
Filesize
2.9MB
MD57b866feb2fc88935abf29c673e9349d4
SHA179097ed6c17a8985f3c6e8183eb9418052d26122
SHA2569b48f80a242f0abb9f411553ad647c78e63a31a5f5c0101990e4ba48a5392e24
SHA5127347cfd42c256341ef5116b620b0a7d04c147a8812c25b6b30e3f8498eaa5bacb366e74dd1dedfbe6feacfd504fecbcb357fc8413b5cc82192bee4b0c521a205