Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
cbf5e424dc90b592d06e8f30f37c1e6b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbf5e424dc90b592d06e8f30f37c1e6b.exe
Resource
win10v2004-20240226-en
General
-
Target
cbf5e424dc90b592d06e8f30f37c1e6b.exe
-
Size
13.2MB
-
MD5
cbf5e424dc90b592d06e8f30f37c1e6b
-
SHA1
c036166895f21a873d666560bfd7e7fce142f260
-
SHA256
2e3bb86704384f0a25c46a9b79a7f2ae0168709d3560d94f92acfd51bd6a7637
-
SHA512
0fec8527110f2c75dc3cb6b61a97fe544596f1b1575a6ac025420fa9fdd651c3dc6c4db5dcc4e1bfb8b29d1bde34c3302f2801430a5140dc626edb4f7d0810d6
-
SSDEEP
6144:1KTDS3aiZOTXbKdags2FNxWUWF5zoINm/nu:QMaiZOT+dags21Wts9vu
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\fozteidv = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2600 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fozteidv\ImagePath = "C:\\Windows\\SysWOW64\\fozteidv\\lukyznci.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 2688 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2488 lukyznci.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2488 set thread context of 2688 2488 lukyznci.exe 41 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2220 sc.exe 2520 sc.exe 2636 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1220 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 28 PID 1928 wrote to memory of 1220 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 28 PID 1928 wrote to memory of 1220 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 28 PID 1928 wrote to memory of 1220 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 28 PID 1928 wrote to memory of 1756 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 30 PID 1928 wrote to memory of 1756 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 30 PID 1928 wrote to memory of 1756 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 30 PID 1928 wrote to memory of 1756 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 30 PID 1928 wrote to memory of 2220 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 32 PID 1928 wrote to memory of 2220 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 32 PID 1928 wrote to memory of 2220 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 32 PID 1928 wrote to memory of 2220 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 32 PID 1928 wrote to memory of 2520 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 34 PID 1928 wrote to memory of 2520 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 34 PID 1928 wrote to memory of 2520 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 34 PID 1928 wrote to memory of 2520 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 34 PID 1928 wrote to memory of 2636 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 36 PID 1928 wrote to memory of 2636 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 36 PID 1928 wrote to memory of 2636 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 36 PID 1928 wrote to memory of 2636 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 36 PID 1928 wrote to memory of 2600 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 39 PID 1928 wrote to memory of 2600 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 39 PID 1928 wrote to memory of 2600 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 39 PID 1928 wrote to memory of 2600 1928 cbf5e424dc90b592d06e8f30f37c1e6b.exe 39 PID 2488 wrote to memory of 2688 2488 lukyznci.exe 41 PID 2488 wrote to memory of 2688 2488 lukyznci.exe 41 PID 2488 wrote to memory of 2688 2488 lukyznci.exe 41 PID 2488 wrote to memory of 2688 2488 lukyznci.exe 41 PID 2488 wrote to memory of 2688 2488 lukyznci.exe 41 PID 2488 wrote to memory of 2688 2488 lukyznci.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf5e424dc90b592d06e8f30f37c1e6b.exe"C:\Users\Admin\AppData\Local\Temp\cbf5e424dc90b592d06e8f30f37c1e6b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fozteidv\2⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\lukyznci.exe" C:\Windows\SysWOW64\fozteidv\2⤵PID:1756
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fozteidv binPath= "C:\Windows\SysWOW64\fozteidv\lukyznci.exe /d\"C:\Users\Admin\AppData\Local\Temp\cbf5e424dc90b592d06e8f30f37c1e6b.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2220
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fozteidv "wifi internet conection"2⤵
- Launches sc.exe
PID:2520
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fozteidv2⤵
- Launches sc.exe
PID:2636
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2600
-
-
C:\Windows\SysWOW64\fozteidv\lukyznci.exeC:\Windows\SysWOW64\fozteidv\lukyznci.exe /d"C:\Users\Admin\AppData\Local\Temp\cbf5e424dc90b592d06e8f30f37c1e6b.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD5ca2c3fd5db12144e14f868eb6eb89027
SHA11aa03140c724c003c3fdb38b4afe575f90da2a43
SHA25659a5224b15b991f33e5ff606f537794c90a15048bf5f73a6b86dc568e67bf82f
SHA5121e8600ee6302896835fcb07d858aa9dc25c2a43a64be41b99be8eec5bf206a3bbde8254538eaa7d307eec7fd7c1c3441f021e61efc4f171b7a724551c4fa9fce
-
Filesize
20KB
MD540a17c63b2d4ac5b6d3f29ec1fa80848
SHA14c242437248c2994b42233bdcf041dda5e00afc3
SHA256fe3f46d02c8aae045642f73487f7a81631b48cb5b8392d02b815b9d9adf89aba
SHA512ef267261a9dc4ff30000ed93027396dd096b121eacd8360e363daf24b8eb34f48becd5aefcf56ca0fc2c20b334cd20e3c23d30631aa790d6ebc67de04d727da1