Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 10:02

General

  • Target

    c04fddfaab6b879a25b036980a34908e.exe

  • Size

    138KB

  • MD5

    c04fddfaab6b879a25b036980a34908e

  • SHA1

    b6692c046c120a1aa3c058ba2bdbf92a82dae451

  • SHA256

    d7a7148cdc505caccc77e11d444a278a47b6b10c9378bcf2a78d937bd2d42b25

  • SHA512

    f1b64b24f50d0370aa04cde3494d14623aba72329b13e1d28d3138b518fdf753c82f091a704b362f4242c488e849d21d62ed7271c66f6169975a1188937a1b96

  • SSDEEP

    3072:/caqyte6QMV77snHLLxtYOxyaXOqdPNbnhW4IxZx5kCZuubFrhU1wKKrONm2:/caBtz77snHRqY7PNNW4IxZ7zbC0rONX

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1124
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1216
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1256
          • C:\Users\Admin\AppData\Local\Temp\c04fddfaab6b879a25b036980a34908e.exe
            "C:\Users\Admin\AppData\Local\Temp\c04fddfaab6b879a25b036980a34908e.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2400
            • C:\Users\Admin\AppData\Roaming\Poux\ihwyk.exe
              "C:\Users\Admin\AppData\Roaming\Poux\ihwyk.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2332
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf3479a3e.bat"
              3⤵
              • Deletes itself
              PID:584
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1820
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:1464
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1536
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1604

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                Filesize

                2.0MB

                MD5

                e590e09d4401ed21d2167a99fa38d75e

                SHA1

                6af504fc3956d6b7503c08219c104c3a422fbaee

                SHA256

                c79673361ef3d343970bc73b8b1be412e5faddedfb4cd10912877d4ec1fb1c6f

                SHA512

                5bf20414410c67407793f3c736eaa159be647d734654d9903f2cb60b0ba7554bd33c479f3a2499f8abbc274bb342f13e8653c0a67d002044cf28a1e415e952d8

              • C:\Users\Admin\AppData\Local\Temp\tmpf3479a3e.bat

                Filesize

                243B

                MD5

                9ec20454d2cab052cd0d3279d36ee864

                SHA1

                f69c3e5d813cde93575b80b3e19486bce62ce94f

                SHA256

                7fd3950ef85de4996d53a7d383c7753903669099df269c76b891a119bda16253

                SHA512

                996b24372f6f827bdd581f5a6024b2f33f5efb522fe8f69aed589498426bc3f71f32cbb3d31560ffd2e797fbacfc2de7bf5589352ebc69a24b4c3c111b9d9e71

              • C:\Users\Admin\AppData\Roaming\Ugweo\numuo.pih

                Filesize

                366B

                MD5

                5525f66b2231e5e1e741e164d9627023

                SHA1

                258c59dc891007951a56b91e6d68383d897673d4

                SHA256

                bd9598dd6411b8690746aee18dcef35c83bcea6ed1342f84d36ccaf008367c49

                SHA512

                5abcfd60bb3104356b856db89ca08782486b6b33559fb8f8a4675946db4a923a5eaa3dd37610281a2152855559816f4a0dd31bac69a53de2ff5c4880df14288e

              • \Users\Admin\AppData\Roaming\Poux\ihwyk.exe

                Filesize

                138KB

                MD5

                260ae0e93b0e34f7b1aeda70135478ff

                SHA1

                43415e41f4999012cd58b50a454047a9efb23561

                SHA256

                6d80cd4ec130e796181b9d897cb84be0b16c8aa50f2caf10f42b0b48c2412766

                SHA512

                a04d60437982835452e1fe5052deabdf6742b996ca0d5e543975f96010f512dd1b1da6f3f6caa1fee96c70c1ec953e29f6667ea4faec3808d30e0b16295177d3

              • memory/584-221-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/584-223-0x0000000077180000-0x0000000077181000-memory.dmp

                Filesize

                4KB

              • memory/584-310-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1124-10-0x00000000020A0000-0x00000000020C7000-memory.dmp

                Filesize

                156KB

              • memory/1124-12-0x00000000020A0000-0x00000000020C7000-memory.dmp

                Filesize

                156KB

              • memory/1124-13-0x00000000020A0000-0x00000000020C7000-memory.dmp

                Filesize

                156KB

              • memory/1124-11-0x00000000020A0000-0x00000000020C7000-memory.dmp

                Filesize

                156KB

              • memory/1124-14-0x00000000020A0000-0x00000000020C7000-memory.dmp

                Filesize

                156KB

              • memory/1216-17-0x0000000001EA0000-0x0000000001EC7000-memory.dmp

                Filesize

                156KB

              • memory/1216-18-0x0000000001EA0000-0x0000000001EC7000-memory.dmp

                Filesize

                156KB

              • memory/1216-19-0x0000000001EA0000-0x0000000001EC7000-memory.dmp

                Filesize

                156KB

              • memory/1216-16-0x0000000001EA0000-0x0000000001EC7000-memory.dmp

                Filesize

                156KB

              • memory/1256-21-0x00000000024B0000-0x00000000024D7000-memory.dmp

                Filesize

                156KB

              • memory/1256-22-0x00000000024B0000-0x00000000024D7000-memory.dmp

                Filesize

                156KB

              • memory/1256-23-0x00000000024B0000-0x00000000024D7000-memory.dmp

                Filesize

                156KB

              • memory/1256-24-0x00000000024B0000-0x00000000024D7000-memory.dmp

                Filesize

                156KB

              • memory/1820-26-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/1820-28-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/1820-30-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/1820-32-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/2400-37-0x0000000000320000-0x0000000000347000-memory.dmp

                Filesize

                156KB

              • memory/2400-46-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-39-0x0000000000320000-0x0000000000347000-memory.dmp

                Filesize

                156KB

              • memory/2400-38-0x0000000000320000-0x0000000000347000-memory.dmp

                Filesize

                156KB

              • memory/2400-48-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-50-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-54-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-58-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-56-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-52-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-61-0x0000000000320000-0x0000000000347000-memory.dmp

                Filesize

                156KB

              • memory/2400-60-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-62-0x0000000077180000-0x0000000077181000-memory.dmp

                Filesize

                4KB

              • memory/2400-35-0x0000000000320000-0x0000000000347000-memory.dmp

                Filesize

                156KB

              • memory/2400-44-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-42-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-40-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-64-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-66-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-68-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-70-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-72-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-36-0x0000000000320000-0x0000000000347000-memory.dmp

                Filesize

                156KB

              • memory/2400-74-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-131-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/2400-216-0x0000000000320000-0x0000000000347000-memory.dmp

                Filesize

                156KB