Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
98581d25200a1b2532cfd763ae2c6f1d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98581d25200a1b2532cfd763ae2c6f1d.exe
Resource
win10v2004-20231215-en
General
-
Target
98581d25200a1b2532cfd763ae2c6f1d.exe
-
Size
167KB
-
MD5
98581d25200a1b2532cfd763ae2c6f1d
-
SHA1
f46c3ce25707fe5f9a4c32db2c64147f61f3fdbb
-
SHA256
7c893523dbc47e9a49d2c6535875601ce62ebc739dabc1d045ab4d0fcc17293e
-
SHA512
596aeb8c2bc9e0c1b0e6e3f1b43427b6d3f55cc7f209978510ac8156302f994b8056e4eab1c770e3f409c3840fb29a9b7c22c5763419f9dd1e5e09cad8bb5031
-
SSDEEP
3072:n7IdezFt/87BLpbl1c/B38sLxM1YGHkAte5sL91IS19M6pRIJRtajjz0RXkuS:n77zFV8dt5A38Am7L91ISndpR8v+z0RU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1252 eboj.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 2756 98581d25200a1b2532cfd763ae2c6f1d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B931092-744B-7A1D-16C2-432F964A04CD} = "C:\\Users\\Admin\\AppData\\Roaming\\Qeucqa\\eboj.exe" eboj.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe 1252 eboj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2756 98581d25200a1b2532cfd763ae2c6f1d.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1252 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 28 PID 2756 wrote to memory of 1252 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 28 PID 2756 wrote to memory of 1252 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 28 PID 2756 wrote to memory of 1252 2756 98581d25200a1b2532cfd763ae2c6f1d.exe 28 PID 1252 wrote to memory of 1072 1252 eboj.exe 18 PID 1252 wrote to memory of 1072 1252 eboj.exe 18 PID 1252 wrote to memory of 1072 1252 eboj.exe 18 PID 1252 wrote to memory of 1072 1252 eboj.exe 18 PID 1252 wrote to memory of 1072 1252 eboj.exe 18 PID 1252 wrote to memory of 1156 1252 eboj.exe 20 PID 1252 wrote to memory of 1156 1252 eboj.exe 20 PID 1252 wrote to memory of 1156 1252 eboj.exe 20 PID 1252 wrote to memory of 1156 1252 eboj.exe 20 PID 1252 wrote to memory of 1156 1252 eboj.exe 20 PID 1252 wrote to memory of 1184 1252 eboj.exe 22 PID 1252 wrote to memory of 1184 1252 eboj.exe 22 PID 1252 wrote to memory of 1184 1252 eboj.exe 22 PID 1252 wrote to memory of 1184 1252 eboj.exe 22 PID 1252 wrote to memory of 1184 1252 eboj.exe 22 PID 1252 wrote to memory of 1508 1252 eboj.exe 23 PID 1252 wrote to memory of 1508 1252 eboj.exe 23 PID 1252 wrote to memory of 1508 1252 eboj.exe 23 PID 1252 wrote to memory of 1508 1252 eboj.exe 23 PID 1252 wrote to memory of 1508 1252 eboj.exe 23 PID 1252 wrote to memory of 2756 1252 eboj.exe 27 PID 1252 wrote to memory of 2756 1252 eboj.exe 27 PID 1252 wrote to memory of 2756 1252 eboj.exe 27 PID 1252 wrote to memory of 2756 1252 eboj.exe 27 PID 1252 wrote to memory of 2756 1252 eboj.exe 27 PID 1252 wrote to memory of 3044 1252 eboj.exe 29 PID 1252 wrote to memory of 3044 1252 eboj.exe 29 PID 1252 wrote to memory of 3044 1252 eboj.exe 29 PID 1252 wrote to memory of 3044 1252 eboj.exe 29 PID 1252 wrote to memory of 3044 1252 eboj.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1072
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\98581d25200a1b2532cfd763ae2c6f1d.exe"C:\Users\Admin\AppData\Local\Temp\98581d25200a1b2532cfd763ae2c6f1d.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\Qeucqa\eboj.exe"C:\Users\Admin\AppData\Roaming\Qeucqa\eboj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1508
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD5e843d47c5340c9b76413babf6210650c
SHA15fd4112018d22fe515f41d69dc119968e09163ef
SHA256b09e3790599e027b3819e51647b3d2502cf3a0401a855ed54e457c7c82fbe788
SHA5126891f1cf8c6aec2b9234ee3d1e8175be079d47f0ddfea8b3fe6a9a47577d8a13c70fa22a3d2e8054a6128847ff74e8536fe602494ab9f242a309e6d8869238e3