Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
c6df4d5c109738b8dd56f9edff8e6420.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6df4d5c109738b8dd56f9edff8e6420.exe
Resource
win10v2004-20240226-en
General
-
Target
c6df4d5c109738b8dd56f9edff8e6420.exe
-
Size
371KB
-
MD5
c6df4d5c109738b8dd56f9edff8e6420
-
SHA1
95c381b7b268f868dd71a7bbc9b7eeb420f6d227
-
SHA256
bbb12296bc48ce8118b286e1e063e400d6be8eb474693b53138bbb1481985383
-
SHA512
dc446bd25b0fd6d14f0b353e5fe03c6b961ca00849981f75180833f8686fe9e609e57efca66e5d45091fecf3a5e8bb679046fd844bf07f634535c83a2bf152f4
-
SSDEEP
6144:LKAofVY5lED/HYYFunddut2HuSzrPn580DqS21L5u/RlBIZ5+PIY:rzwDfYhdut2X3/5DykRlw5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2988 bIaMiKfIbCg17713.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 bIaMiKfIbCg17713.exe -
Loads dropped DLL 2 IoCs
pid Process 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe -
resource yara_rule behavioral1/memory/2896-1-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2988-16-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2896-23-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2988-24-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2988-41-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/2896-65-0x0000000000400000-0x00000000004B9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bIaMiKfIbCg17713 = "C:\\ProgramData\\bIaMiKfIbCg17713\\bIaMiKfIbCg17713.exe" bIaMiKfIbCg17713.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main bIaMiKfIbCg17713.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 2988 bIaMiKfIbCg17713.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2896 c6df4d5c109738b8dd56f9edff8e6420.exe Token: SeDebugPrivilege 2988 bIaMiKfIbCg17713.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2988 bIaMiKfIbCg17713.exe 2988 bIaMiKfIbCg17713.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2988 bIaMiKfIbCg17713.exe 2988 bIaMiKfIbCg17713.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2988 bIaMiKfIbCg17713.exe 2988 bIaMiKfIbCg17713.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2988 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 28 PID 2896 wrote to memory of 2988 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 28 PID 2896 wrote to memory of 2988 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 28 PID 2896 wrote to memory of 2988 2896 c6df4d5c109738b8dd56f9edff8e6420.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6df4d5c109738b8dd56f9edff8e6420.exe"C:\Users\Admin\AppData\Local\Temp\c6df4d5c109738b8dd56f9edff8e6420.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\ProgramData\bIaMiKfIbCg17713\bIaMiKfIbCg17713.exe"C:\ProgramData\bIaMiKfIbCg17713\bIaMiKfIbCg17713.exe" "C:\Users\Admin\AppData\Local\Temp\c6df4d5c109738b8dd56f9edff8e6420.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD5f16ccce0f696decaf1f7c40342538193
SHA1a8286178c38bd91f5a4990ebb90d6dd55b60cad9
SHA2561184a02d8820748d9530ab745a83fe352827547ad10d298bd2193017b1e4c5be
SHA5124c05f174c46c1eb546dd4b96817269bb88f81f7bbd11cfe1cecf95005542eb470767c39c6a5b40332c2ae043050bef80bddba85a2244e9f743082f731112cc62