Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 10:56
Behavioral task
behavioral1
Sample
993dce8e99765166d85c5049951f52c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
993dce8e99765166d85c5049951f52c6.exe
Resource
win10v2004-20231215-en
General
-
Target
993dce8e99765166d85c5049951f52c6.exe
-
Size
86KB
-
MD5
993dce8e99765166d85c5049951f52c6
-
SHA1
1ff33f44c6f4179ca4dfceeedc6dbd10259bf325
-
SHA256
de997cabab2bda1334d129112199ba780d250dd923db4b4035def25755df8200
-
SHA512
0f1ebf2b075f3b045fd7885eba700ed82fb67055401e500753138083201a1d36bf3ef9c06dff18802fed6c15b2b33167f44b58aa9aae279c3439baaffc976d2a
-
SSDEEP
1536:kuMyiWMPfQSiy6kWLVvBOQ+ptrblnouy8:5SW+fQSIkQVv8QGJ9out
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2708 SiZhu.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 993dce8e99765166d85c5049951f52c6.exe 3068 993dce8e99765166d85c5049951f52c6.exe -
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0008000000012284-3.dat upx behavioral1/memory/2708-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-23-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 993dce8e99765166d85c5049951f52c6.exe File opened (read-only) \??\H: 993dce8e99765166d85c5049951f52c6.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SiZhu.exe 993dce8e99765166d85c5049951f52c6.exe File created C:\Windows\SysWOW64\SiZhu.exe 993dce8e99765166d85c5049951f52c6.exe File opened for modification C:\Windows\SysWOW64\SiZhu.exe SiZhu.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3068 993dce8e99765166d85c5049951f52c6.exe 2708 SiZhu.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2708 3068 993dce8e99765166d85c5049951f52c6.exe 28 PID 3068 wrote to memory of 2708 3068 993dce8e99765166d85c5049951f52c6.exe 28 PID 3068 wrote to memory of 2708 3068 993dce8e99765166d85c5049951f52c6.exe 28 PID 3068 wrote to memory of 2708 3068 993dce8e99765166d85c5049951f52c6.exe 28 PID 2708 wrote to memory of 2696 2708 SiZhu.exe 29 PID 2708 wrote to memory of 2696 2708 SiZhu.exe 29 PID 2708 wrote to memory of 2696 2708 SiZhu.exe 29 PID 2708 wrote to memory of 2696 2708 SiZhu.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\993dce8e99765166d85c5049951f52c6.exe"C:\Users\Admin\AppData\Local\Temp\993dce8e99765166d85c5049951f52c6.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\SiZhu.exeC:\Windows\system32\SiZhu.exe SiZhu2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat3⤵PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD505f52e759c787bfbf843ba36ccf734a2
SHA12d81a279dd24a320a62d184fec747ca5f70570ee
SHA2564c9b671f2169b55c0265974d2d618e9e03060a0664da88c05ea580be9eb2a7a9
SHA512efcbce3fbcb8a0e22d4b41bfcf7afe73e5dd1bf4ceded4892fdd060e993dcf7c3930c989b6eb4fe1b690ced1f70a0e9ef75dfe6b5e2a61f9be14ef9169c6d172
-
Filesize
86KB
MD5993dce8e99765166d85c5049951f52c6
SHA11ff33f44c6f4179ca4dfceeedc6dbd10259bf325
SHA256de997cabab2bda1334d129112199ba780d250dd923db4b4035def25755df8200
SHA5120f1ebf2b075f3b045fd7885eba700ed82fb67055401e500753138083201a1d36bf3ef9c06dff18802fed6c15b2b33167f44b58aa9aae279c3439baaffc976d2a