Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
bc9734c2cc8f0ce729606a1094139e5e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc9734c2cc8f0ce729606a1094139e5e.exe
Resource
win10v2004-20240226-en
General
-
Target
bc9734c2cc8f0ce729606a1094139e5e.exe
-
Size
11.7MB
-
MD5
bc9734c2cc8f0ce729606a1094139e5e
-
SHA1
9ba350559fdc66ad89cfaa88374dddcefd49ea37
-
SHA256
dc9b51704541b43494bab704763d5f593a560cd758fd8d1aba1817a9a4ebd6b5
-
SHA512
ed704ce7597efd3cb4e1ebb7acb3dacbc53f4f0819cf800ead36a07c7044d01115994303b467330ccd7c9a07bd40f46279ccb05abc528508bb41a86187885040
-
SSDEEP
24576:ajCj10HSqGgeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeO:a/D
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3868 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\qoyymeeg\ImagePath = "C:\\Windows\\SysWOW64\\qoyymeeg\\gyhpmzlf.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation bc9734c2cc8f0ce729606a1094139e5e.exe -
Executes dropped EXE 1 IoCs
pid Process 3696 gyhpmzlf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3696 set thread context of 5008 3696 gyhpmzlf.exe 103 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2948 sc.exe 3284 sc.exe 5012 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4428 wrote to memory of 4952 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 90 PID 4428 wrote to memory of 4952 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 90 PID 4428 wrote to memory of 4952 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 90 PID 4428 wrote to memory of 760 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 92 PID 4428 wrote to memory of 760 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 92 PID 4428 wrote to memory of 760 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 92 PID 4428 wrote to memory of 3284 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 94 PID 4428 wrote to memory of 3284 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 94 PID 4428 wrote to memory of 3284 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 94 PID 4428 wrote to memory of 5012 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 96 PID 4428 wrote to memory of 5012 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 96 PID 4428 wrote to memory of 5012 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 96 PID 4428 wrote to memory of 2948 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 98 PID 4428 wrote to memory of 2948 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 98 PID 4428 wrote to memory of 2948 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 98 PID 4428 wrote to memory of 3868 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 101 PID 4428 wrote to memory of 3868 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 101 PID 4428 wrote to memory of 3868 4428 bc9734c2cc8f0ce729606a1094139e5e.exe 101 PID 3696 wrote to memory of 5008 3696 gyhpmzlf.exe 103 PID 3696 wrote to memory of 5008 3696 gyhpmzlf.exe 103 PID 3696 wrote to memory of 5008 3696 gyhpmzlf.exe 103 PID 3696 wrote to memory of 5008 3696 gyhpmzlf.exe 103 PID 3696 wrote to memory of 5008 3696 gyhpmzlf.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc9734c2cc8f0ce729606a1094139e5e.exe"C:\Users\Admin\AppData\Local\Temp\bc9734c2cc8f0ce729606a1094139e5e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qoyymeeg\2⤵PID:4952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gyhpmzlf.exe" C:\Windows\SysWOW64\qoyymeeg\2⤵PID:760
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qoyymeeg binPath= "C:\Windows\SysWOW64\qoyymeeg\gyhpmzlf.exe /d\"C:\Users\Admin\AppData\Local\Temp\bc9734c2cc8f0ce729606a1094139e5e.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3284
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qoyymeeg "wifi internet conection"2⤵
- Launches sc.exe
PID:5012
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qoyymeeg2⤵
- Launches sc.exe
PID:2948
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3868
-
-
C:\Windows\SysWOW64\qoyymeeg\gyhpmzlf.exeC:\Windows\SysWOW64\qoyymeeg\gyhpmzlf.exe /d"C:\Users\Admin\AppData\Local\Temp\bc9734c2cc8f0ce729606a1094139e5e.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:5008
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.4MB
MD5cdebe7bc8c68be048a3a5d6ef7a52339
SHA1675e708d32e61a7f7f40cbef8c764764161c92f2
SHA256b7c32ad5a8f0d1a24c3adfb6273481e32b87eabac4d3d37c4406dcc96745e0a8
SHA51295c372c754d79896dd1f7fac8ee2f49ad9b4d46f7949b234d7584692d3d7bcf163abfe008cc685c077990166ee3432516344c2a79758e74da35c5e1314f78e61
-
Filesize
4.8MB
MD5e3b95f3a2d0e804217de3da28a1ffcfe
SHA18e973ac38903d4b434213d5a021ddaa5a07c4f85
SHA256de65b3184b61013b49a83d494bb506f88dbad6c1bb9c2519f995f4c51a9ab17f
SHA512e7cef782eb304a823866e3fbd30d9d0110c07a2272fe9defc1c03073b9b49c774433d488ef5381deacf7d5b2e98798599d38706aecc9a4303bcfd8d55e8b61c9