Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 18:01
Behavioral task
behavioral1
Sample
72aece57191774ee8faa706df2fb668f.exe
Resource
win7-20231215-en
General
-
Target
72aece57191774ee8faa706df2fb668f.exe
-
Size
401KB
-
MD5
72aece57191774ee8faa706df2fb668f
-
SHA1
0a397db178732b4d0e3e1ca8567ab8f08de89b93
-
SHA256
665c0f4b784ab387fba7f945059dad5b8462b0ccffa96f2110ea673dabdd2044
-
SHA512
6c547649fb3058cfbea61cd05df8f9ad222abb1213687f9f2d5ac7dad10f05c0c7b6bf2f4edd50b181b2cfe17c663a99e3fcc5d215e7e803334d9592d1af8bfa
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrohW:8IfBoDWoyFblU6hAJQnO0
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 604 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 3004 yhqih.exe 1456 ecnony.exe 1536 oravq.exe -
Loads dropped DLL 5 IoCs
pid Process 1696 72aece57191774ee8faa706df2fb668f.exe 1696 72aece57191774ee8faa706df2fb668f.exe 3004 yhqih.exe 3004 yhqih.exe 1456 ecnony.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe 1536 oravq.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3004 1696 72aece57191774ee8faa706df2fb668f.exe 28 PID 1696 wrote to memory of 3004 1696 72aece57191774ee8faa706df2fb668f.exe 28 PID 1696 wrote to memory of 3004 1696 72aece57191774ee8faa706df2fb668f.exe 28 PID 1696 wrote to memory of 3004 1696 72aece57191774ee8faa706df2fb668f.exe 28 PID 1696 wrote to memory of 604 1696 72aece57191774ee8faa706df2fb668f.exe 31 PID 1696 wrote to memory of 604 1696 72aece57191774ee8faa706df2fb668f.exe 31 PID 1696 wrote to memory of 604 1696 72aece57191774ee8faa706df2fb668f.exe 31 PID 1696 wrote to memory of 604 1696 72aece57191774ee8faa706df2fb668f.exe 31 PID 3004 wrote to memory of 1456 3004 yhqih.exe 30 PID 3004 wrote to memory of 1456 3004 yhqih.exe 30 PID 3004 wrote to memory of 1456 3004 yhqih.exe 30 PID 3004 wrote to memory of 1456 3004 yhqih.exe 30 PID 1456 wrote to memory of 1536 1456 ecnony.exe 34 PID 1456 wrote to memory of 1536 1456 ecnony.exe 34 PID 1456 wrote to memory of 1536 1456 ecnony.exe 34 PID 1456 wrote to memory of 1536 1456 ecnony.exe 34 PID 1456 wrote to memory of 2172 1456 ecnony.exe 36 PID 1456 wrote to memory of 2172 1456 ecnony.exe 36 PID 1456 wrote to memory of 2172 1456 ecnony.exe 36 PID 1456 wrote to memory of 2172 1456 ecnony.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\72aece57191774ee8faa706df2fb668f.exe"C:\Users\Admin\AppData\Local\Temp\72aece57191774ee8faa706df2fb668f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\yhqih.exe"C:\Users\Admin\AppData\Local\Temp\yhqih.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\ecnony.exe"C:\Users\Admin\AppData\Local\Temp\ecnony.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\oravq.exe"C:\Users\Admin\AppData\Local\Temp\oravq.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:2172
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD55c66acc43ae456f356e617467702c56c
SHA1dcd24c79cb78e0dd2f31c6ccc2b1f9ac07f8b270
SHA256aba1fc6cdc0fd31e39bb693c40604a46683e6c2c41457b9f7f476e7a7d376abc
SHA51264284e7b2b9e7c96cce097d208ef4461a943945a75b0869e4c3158b1c8bfeecb7a1364e3b3599edef77fb04bbec690d0efafa7f064ce846d64c0116172557ac4
-
Filesize
224B
MD55c6387681a6dfc16fb1037295561e301
SHA19afa6333feb4a0aa0dce9ef214e45e3904246c89
SHA25657143106b75c1fcf206336ab18297323ed4ee81284b889a38713c0d5dbbc2217
SHA512a26d3c2966d80cf5349a57c96d0c65141512ff63b16680bb0f780cd96f266a555583ce5db63bc8fcff64c89772a85619c36ae524f89fe78da51983da8d6a2e58
-
Filesize
512B
MD55af685f8348fc90c5109416361403bc8
SHA1209cce317d59b1a95f57054921413d7892a101e9
SHA256be7efde1e9e4db92d8fa7a89e9844b8d36a6f880cf49f29206f909908f9cbb4a
SHA512bf7fb673e507fc9ff1f590a45d857f288945801d2404b74d314fc12bea6703c3a86584150b9095197d5cde4659e90457492516945fbd89315b38827d97e343d4
-
Filesize
401KB
MD5da3fa384b54e35021d6be105344270f0
SHA1ac3060a3a3f4773cd647723420bd3afd46b126ae
SHA25619dd52663aaacf0f25c1fee88d11a2c82693cd1410fa704e371ade9d21b636eb
SHA512d8d2bba8f83ef30a562dd14b47c1420bc043fcaf495fe6248d67344f8ab3a8f8776e8280a2b669c288ebcc3b63585249bcd3c146bbf24ec3315a845e5f14e187
-
Filesize
223KB
MD5cdf1cae1ababd56da47590fafb66c18f
SHA167c7f0962ba6d9195dbc1e10e3a1d9141f4cb4dc
SHA256fdced709bab914cbcb6d167f1dc76ea44e51c3e8412666f7abb495322711b71c
SHA51296881ef763bb8d087e56949934522900646eb9c419ca94b04004b1a5aad3da154ecac843ef560e99c342c088781530e5e273d7a4401b09bc8be1cdc5500d2e58
-
Filesize
401KB
MD5af9308ce9794075e64e0e0ba8203d7ad
SHA1e71c63de4ef60ab303167030a8a3da9bbac1135f
SHA2565d338d91b2900773596528b8ac8be0f4ea2ee184fbdb4518fc347a31a4034c75
SHA5129b113da3953186fb18a30eba1e760593ed06fd7189029ce386a6ccd14d5f508eb0e8f8bd6b2f0b2c73c3b2f1468fd7ef0c39350033fffa4d8992a271a0ea6e9b