Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
7d622157c4c9861a2bb4a1c5ffd85106.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d622157c4c9861a2bb4a1c5ffd85106.exe
Resource
win10v2004-20231215-en
General
-
Target
7d622157c4c9861a2bb4a1c5ffd85106.exe
-
Size
12.5MB
-
MD5
7d622157c4c9861a2bb4a1c5ffd85106
-
SHA1
8950e8c7908624eecf9c59f978446f1cafa2fded
-
SHA256
8dd3ef051e815d7e2e7bd153477614356dac6f34f6510a06e5a19a4f84a0fb9e
-
SHA512
38d6ba9613e13f07e91db844d856fc87da698dadacc0086a0b63e2ad365292fbbbad571099d0c70ce73f682df8fc46e1a33a5614d8010a400d4d2af05f2c8db7
-
SSDEEP
49152:BaBVqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqm:4
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\ggunhmbw = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2688 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ggunhmbw\ImagePath = "C:\\Windows\\SysWOW64\\ggunhmbw\\mvhnxsoe.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2572 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 mvhnxsoe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 2572 2544 mvhnxsoe.exe 39 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2712 sc.exe 2696 sc.exe 2628 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2344 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 28 PID 1488 wrote to memory of 2344 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 28 PID 1488 wrote to memory of 2344 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 28 PID 1488 wrote to memory of 2344 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 28 PID 1488 wrote to memory of 2784 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 30 PID 1488 wrote to memory of 2784 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 30 PID 1488 wrote to memory of 2784 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 30 PID 1488 wrote to memory of 2784 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 30 PID 1488 wrote to memory of 2628 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 32 PID 1488 wrote to memory of 2628 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 32 PID 1488 wrote to memory of 2628 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 32 PID 1488 wrote to memory of 2628 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 32 PID 1488 wrote to memory of 2712 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 34 PID 1488 wrote to memory of 2712 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 34 PID 1488 wrote to memory of 2712 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 34 PID 1488 wrote to memory of 2712 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 34 PID 1488 wrote to memory of 2696 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 37 PID 1488 wrote to memory of 2696 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 37 PID 1488 wrote to memory of 2696 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 37 PID 1488 wrote to memory of 2696 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 37 PID 1488 wrote to memory of 2688 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 41 PID 1488 wrote to memory of 2688 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 41 PID 1488 wrote to memory of 2688 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 41 PID 1488 wrote to memory of 2688 1488 7d622157c4c9861a2bb4a1c5ffd85106.exe 41 PID 2544 wrote to memory of 2572 2544 mvhnxsoe.exe 39 PID 2544 wrote to memory of 2572 2544 mvhnxsoe.exe 39 PID 2544 wrote to memory of 2572 2544 mvhnxsoe.exe 39 PID 2544 wrote to memory of 2572 2544 mvhnxsoe.exe 39 PID 2544 wrote to memory of 2572 2544 mvhnxsoe.exe 39 PID 2544 wrote to memory of 2572 2544 mvhnxsoe.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d622157c4c9861a2bb4a1c5ffd85106.exe"C:\Users\Admin\AppData\Local\Temp\7d622157c4c9861a2bb4a1c5ffd85106.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ggunhmbw\2⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mvhnxsoe.exe" C:\Windows\SysWOW64\ggunhmbw\2⤵PID:2784
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ggunhmbw binPath= "C:\Windows\SysWOW64\ggunhmbw\mvhnxsoe.exe /d\"C:\Users\Admin\AppData\Local\Temp\7d622157c4c9861a2bb4a1c5ffd85106.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2628
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ggunhmbw "wifi internet conection"2⤵
- Launches sc.exe
PID:2712
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ggunhmbw2⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2688
-
-
C:\Windows\SysWOW64\ggunhmbw\mvhnxsoe.exeC:\Windows\SysWOW64\ggunhmbw\mvhnxsoe.exe /d"C:\Users\Admin\AppData\Local\Temp\7d622157c4c9861a2bb4a1c5ffd85106.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD50836d0911aebd95a40de163b6fb444ae
SHA1e771b4eab25ef7468ad247c6899973b78fb402dc
SHA256800a534a2f1509fd4102e59ab72fbe2840936636ba7aa9adc0bd35fd1ed8c988
SHA5121afdc720776a6f0bd0711efb3b183d1eb288e7071a5dadf26efc72c1d5ac84fd9577ceeaafe93d074d6a738b9ae01630677ce553c11a316b115642782b6b36a4
-
Filesize
1.4MB
MD569a86c567498f06dd42e40d5e5c8232e
SHA182631314c4e6daf083daed8fee7ef1654ca9b737
SHA25605bb8e140f81df616446ee8db5b03edeb6cab517224882fce17098dc07876d55
SHA512bbb489768f5210b6a8f518fa302547a45bb0a5a2a79297e689b3467516f1a881f7fade1224e54cc157f5d38c76380baf99d2149fa2bdbbd838524c72603b54b1