Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
c04fddfaab6b879a25b036980a34908e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c04fddfaab6b879a25b036980a34908e.exe
Resource
win10v2004-20240226-en
General
-
Target
c04fddfaab6b879a25b036980a34908e.exe
-
Size
138KB
-
MD5
c04fddfaab6b879a25b036980a34908e
-
SHA1
b6692c046c120a1aa3c058ba2bdbf92a82dae451
-
SHA256
d7a7148cdc505caccc77e11d444a278a47b6b10c9378bcf2a78d937bd2d42b25
-
SHA512
f1b64b24f50d0370aa04cde3494d14623aba72329b13e1d28d3138b518fdf753c82f091a704b362f4242c488e849d21d62ed7271c66f6169975a1188937a1b96
-
SSDEEP
3072:/caqyte6QMV77snHLLxtYOxyaXOqdPNbnhW4IxZx5kCZuubFrhU1wKKrONm2:/caBtz77snHRqY7PNNW4IxZ7zbC0rONX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 584 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 ihwyk.exe -
Loads dropped DLL 2 IoCs
pid Process 2400 c04fddfaab6b879a25b036980a34908e.exe 2400 c04fddfaab6b879a25b036980a34908e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D5E43BDD-6DE8-5DD4-10B0-233C20C0BA92} = "C:\\Users\\Admin\\AppData\\Roaming\\Poux\\ihwyk.exe" ihwyk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Privacy c04fddfaab6b879a25b036980a34908e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" c04fddfaab6b879a25b036980a34908e.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\09F473F5-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe 2332 ihwyk.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2400 c04fddfaab6b879a25b036980a34908e.exe Token: SeSecurityPrivilege 2400 c04fddfaab6b879a25b036980a34908e.exe Token: SeSecurityPrivilege 2400 c04fddfaab6b879a25b036980a34908e.exe Token: SeManageVolumePrivilege 1464 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1464 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1464 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1464 WinMail.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2332 2400 c04fddfaab6b879a25b036980a34908e.exe 28 PID 2400 wrote to memory of 2332 2400 c04fddfaab6b879a25b036980a34908e.exe 28 PID 2400 wrote to memory of 2332 2400 c04fddfaab6b879a25b036980a34908e.exe 28 PID 2400 wrote to memory of 2332 2400 c04fddfaab6b879a25b036980a34908e.exe 28 PID 2332 wrote to memory of 1124 2332 ihwyk.exe 19 PID 2332 wrote to memory of 1124 2332 ihwyk.exe 19 PID 2332 wrote to memory of 1124 2332 ihwyk.exe 19 PID 2332 wrote to memory of 1124 2332 ihwyk.exe 19 PID 2332 wrote to memory of 1124 2332 ihwyk.exe 19 PID 2332 wrote to memory of 1216 2332 ihwyk.exe 20 PID 2332 wrote to memory of 1216 2332 ihwyk.exe 20 PID 2332 wrote to memory of 1216 2332 ihwyk.exe 20 PID 2332 wrote to memory of 1216 2332 ihwyk.exe 20 PID 2332 wrote to memory of 1216 2332 ihwyk.exe 20 PID 2332 wrote to memory of 1256 2332 ihwyk.exe 21 PID 2332 wrote to memory of 1256 2332 ihwyk.exe 21 PID 2332 wrote to memory of 1256 2332 ihwyk.exe 21 PID 2332 wrote to memory of 1256 2332 ihwyk.exe 21 PID 2332 wrote to memory of 1256 2332 ihwyk.exe 21 PID 2332 wrote to memory of 1820 2332 ihwyk.exe 23 PID 2332 wrote to memory of 1820 2332 ihwyk.exe 23 PID 2332 wrote to memory of 1820 2332 ihwyk.exe 23 PID 2332 wrote to memory of 1820 2332 ihwyk.exe 23 PID 2332 wrote to memory of 1820 2332 ihwyk.exe 23 PID 2332 wrote to memory of 2400 2332 ihwyk.exe 27 PID 2332 wrote to memory of 2400 2332 ihwyk.exe 27 PID 2332 wrote to memory of 2400 2332 ihwyk.exe 27 PID 2332 wrote to memory of 2400 2332 ihwyk.exe 27 PID 2332 wrote to memory of 2400 2332 ihwyk.exe 27 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2400 wrote to memory of 584 2400 c04fddfaab6b879a25b036980a34908e.exe 30 PID 2332 wrote to memory of 1536 2332 ihwyk.exe 32 PID 2332 wrote to memory of 1536 2332 ihwyk.exe 32 PID 2332 wrote to memory of 1536 2332 ihwyk.exe 32 PID 2332 wrote to memory of 1536 2332 ihwyk.exe 32 PID 2332 wrote to memory of 1536 2332 ihwyk.exe 32 PID 2332 wrote to memory of 1604 2332 ihwyk.exe 33 PID 2332 wrote to memory of 1604 2332 ihwyk.exe 33 PID 2332 wrote to memory of 1604 2332 ihwyk.exe 33 PID 2332 wrote to memory of 1604 2332 ihwyk.exe 33 PID 2332 wrote to memory of 1604 2332 ihwyk.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1216
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\c04fddfaab6b879a25b036980a34908e.exe"C:\Users\Admin\AppData\Local\Temp\c04fddfaab6b879a25b036980a34908e.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\Poux\ihwyk.exe"C:\Users\Admin\AppData\Roaming\Poux\ihwyk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf3479a3e.bat"3⤵
- Deletes itself
PID:584
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1820
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1464
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1536
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5e590e09d4401ed21d2167a99fa38d75e
SHA16af504fc3956d6b7503c08219c104c3a422fbaee
SHA256c79673361ef3d343970bc73b8b1be412e5faddedfb4cd10912877d4ec1fb1c6f
SHA5125bf20414410c67407793f3c736eaa159be647d734654d9903f2cb60b0ba7554bd33c479f3a2499f8abbc274bb342f13e8653c0a67d002044cf28a1e415e952d8
-
Filesize
243B
MD59ec20454d2cab052cd0d3279d36ee864
SHA1f69c3e5d813cde93575b80b3e19486bce62ce94f
SHA2567fd3950ef85de4996d53a7d383c7753903669099df269c76b891a119bda16253
SHA512996b24372f6f827bdd581f5a6024b2f33f5efb522fe8f69aed589498426bc3f71f32cbb3d31560ffd2e797fbacfc2de7bf5589352ebc69a24b4c3c111b9d9e71
-
Filesize
366B
MD55525f66b2231e5e1e741e164d9627023
SHA1258c59dc891007951a56b91e6d68383d897673d4
SHA256bd9598dd6411b8690746aee18dcef35c83bcea6ed1342f84d36ccaf008367c49
SHA5125abcfd60bb3104356b856db89ca08782486b6b33559fb8f8a4675946db4a923a5eaa3dd37610281a2152855559816f4a0dd31bac69a53de2ff5c4880df14288e
-
Filesize
138KB
MD5260ae0e93b0e34f7b1aeda70135478ff
SHA143415e41f4999012cd58b50a454047a9efb23561
SHA2566d80cd4ec130e796181b9d897cb84be0b16c8aa50f2caf10f42b0b48c2412766
SHA512a04d60437982835452e1fe5052deabdf6742b996ca0d5e543975f96010f512dd1b1da6f3f6caa1fee96c70c1ec953e29f6667ea4faec3808d30e0b16295177d3