Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
d3f526c8767e900d243200bba821e3bf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d3f526c8767e900d243200bba821e3bf.exe
Resource
win10v2004-20240226-en
General
-
Target
d3f526c8767e900d243200bba821e3bf.exe
-
Size
171KB
-
MD5
d3f526c8767e900d243200bba821e3bf
-
SHA1
a4941f9446d9f134e5ecec8f6c5b56d80e645e2c
-
SHA256
20aaee1ac8fd694ad7dd941432676adb62160319b683636499541882031ff13e
-
SHA512
b312518645b4ee1290aba14ece017d19fa6213dbba86ce8f7c7e03ca2d13131b2521c87602f521cbab302722e46e89ac981f713a83f7ad2ed305de51167a327a
-
SSDEEP
3072:bB4FJDDTw6EVSp0ydsKA/QcbM7f5CGg4I7DA5a/c2AHJyWza9q4iuOneRLaZmqQV:bBqDDs6asU7DA5F2Cyt9DGeRLaZmqsDJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2872 ydoq.exe -
Loads dropped DLL 2 IoCs
pid Process 2936 d3f526c8767e900d243200bba821e3bf.exe 2936 d3f526c8767e900d243200bba821e3bf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C0DFE55F-B382-467A-63DF-F575A8F80227} = "C:\\Users\\Admin\\AppData\\Roaming\\Neohdy\\ydoq.exe" ydoq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy d3f526c8767e900d243200bba821e3bf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d3f526c8767e900d243200bba821e3bf.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\5BC325B2-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe 2872 ydoq.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeManageVolumePrivilege 656 WinMail.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2936 d3f526c8767e900d243200bba821e3bf.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe Token: SeSecurityPrivilege 2872 ydoq.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 656 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 656 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 656 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2872 2936 d3f526c8767e900d243200bba821e3bf.exe 28 PID 2936 wrote to memory of 2872 2936 d3f526c8767e900d243200bba821e3bf.exe 28 PID 2936 wrote to memory of 2872 2936 d3f526c8767e900d243200bba821e3bf.exe 28 PID 2936 wrote to memory of 2872 2936 d3f526c8767e900d243200bba821e3bf.exe 28 PID 2872 wrote to memory of 1248 2872 ydoq.exe 19 PID 2872 wrote to memory of 1248 2872 ydoq.exe 19 PID 2872 wrote to memory of 1248 2872 ydoq.exe 19 PID 2872 wrote to memory of 1248 2872 ydoq.exe 19 PID 2872 wrote to memory of 1248 2872 ydoq.exe 19 PID 2872 wrote to memory of 1328 2872 ydoq.exe 20 PID 2872 wrote to memory of 1328 2872 ydoq.exe 20 PID 2872 wrote to memory of 1328 2872 ydoq.exe 20 PID 2872 wrote to memory of 1328 2872 ydoq.exe 20 PID 2872 wrote to memory of 1328 2872 ydoq.exe 20 PID 2872 wrote to memory of 1372 2872 ydoq.exe 21 PID 2872 wrote to memory of 1372 2872 ydoq.exe 21 PID 2872 wrote to memory of 1372 2872 ydoq.exe 21 PID 2872 wrote to memory of 1372 2872 ydoq.exe 21 PID 2872 wrote to memory of 1372 2872 ydoq.exe 21 PID 2872 wrote to memory of 1520 2872 ydoq.exe 23 PID 2872 wrote to memory of 1520 2872 ydoq.exe 23 PID 2872 wrote to memory of 1520 2872 ydoq.exe 23 PID 2872 wrote to memory of 1520 2872 ydoq.exe 23 PID 2872 wrote to memory of 1520 2872 ydoq.exe 23 PID 2872 wrote to memory of 2936 2872 ydoq.exe 27 PID 2872 wrote to memory of 2936 2872 ydoq.exe 27 PID 2872 wrote to memory of 2936 2872 ydoq.exe 27 PID 2872 wrote to memory of 2936 2872 ydoq.exe 27 PID 2872 wrote to memory of 2936 2872 ydoq.exe 27 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2936 wrote to memory of 2392 2936 d3f526c8767e900d243200bba821e3bf.exe 30 PID 2872 wrote to memory of 2924 2872 ydoq.exe 31 PID 2872 wrote to memory of 2924 2872 ydoq.exe 31 PID 2872 wrote to memory of 2924 2872 ydoq.exe 31 PID 2872 wrote to memory of 2924 2872 ydoq.exe 31 PID 2872 wrote to memory of 2924 2872 ydoq.exe 31 PID 2872 wrote to memory of 2632 2872 ydoq.exe 32 PID 2872 wrote to memory of 2632 2872 ydoq.exe 32 PID 2872 wrote to memory of 2632 2872 ydoq.exe 32 PID 2872 wrote to memory of 2632 2872 ydoq.exe 32 PID 2872 wrote to memory of 2632 2872 ydoq.exe 32 PID 2872 wrote to memory of 2592 2872 ydoq.exe 33 PID 2872 wrote to memory of 2592 2872 ydoq.exe 33 PID 2872 wrote to memory of 2592 2872 ydoq.exe 33 PID 2872 wrote to memory of 2592 2872 ydoq.exe 33 PID 2872 wrote to memory of 2592 2872 ydoq.exe 33 PID 2872 wrote to memory of 2196 2872 ydoq.exe 34 PID 2872 wrote to memory of 2196 2872 ydoq.exe 34 PID 2872 wrote to memory of 2196 2872 ydoq.exe 34 PID 2872 wrote to memory of 2196 2872 ydoq.exe 34 PID 2872 wrote to memory of 2196 2872 ydoq.exe 34 PID 2872 wrote to memory of 1776 2872 ydoq.exe 37 PID 2872 wrote to memory of 1776 2872 ydoq.exe 37 PID 2872 wrote to memory of 1776 2872 ydoq.exe 37 PID 2872 wrote to memory of 1776 2872 ydoq.exe 37 PID 2872 wrote to memory of 1776 2872 ydoq.exe 37 PID 2872 wrote to memory of 1924 2872 ydoq.exe 38
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\d3f526c8767e900d243200bba821e3bf.exe"C:\Users\Admin\AppData\Local\Temp\d3f526c8767e900d243200bba821e3bf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Roaming\Neohdy\ydoq.exe"C:\Users\Admin\AppData\Roaming\Neohdy\ydoq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcf619caa.bat"3⤵PID:2392
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1520
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:656
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-108532438718756394631264413610-1954638340930373586-740353422-1076134592243291695"1⤵PID:2924
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2632
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2592
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2196
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1776
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5d03b16b4405aa3b64bdabdfbb3257590
SHA167edfb3382f9d60031466f7562dfdf2569d449a3
SHA256aefb04222d25c592f56c12cc807169ba5f90ca6b393c05cd506bd1b8035b933c
SHA512d149ce804555f2117c3104ef8908676f6c59a69effdf2173c91d2d710be1b9459088fb4c3f92c646e242ae8e8ba17efd6d6829aa57fe10daf24d8caa9d053976
-
Filesize
366B
MD55914d040d32ede8ec91043edc701785d
SHA13b0548dc6bc9c8a5df829f9a495187ebf3147d81
SHA25627d3b89a944b8bc79e0b1550de36999984ebb6aa24e0a1950d2debaee866ba0b
SHA51240f5aa9929d3740d7e4fb792fbc51aeea818728a8ec5ddf90e5cb356ba3e6e049edeed14363448f2b4675c45b919d41f9708f404351d13d7ca36eb268f1ebc50
-
Filesize
13KB
MD537867539fa4d6d795d6a230bdd0134e5
SHA13fdd8e8ee526af6b009df639122652d1a9e066eb
SHA256cd9b269dbf25af7207b8fd276d51fb711a7aef7c5b3c677ddc0f43d2894a4a6b
SHA512913716f3434f024d120d8b8c09966755942b2aeb3e524124da13604675b31c4caccc696c069f3211ce7108a66a4f213964f954d3113cd604ed36b4b32362bd8a
-
Filesize
3KB
MD5f80cea5fdd71c6066dd0d4e25f483ffb
SHA1c29649068a42b3a00a1bb45800ed4e5f65a158a5
SHA25697b5404b842828147ef541909dd257b9b4da9886ea36d5716d60c4099b6a3c56
SHA512aeaf7871c8ddbea80190c8cff1f7289c5915b2dc2cd9f3aa412d28c860bacb5cf851c8b3544e6d660ac3a765754c85be4d17e3a04a6f1df6fc373b8a25c966c4
-
Filesize
13KB
MD55843c155df84084cfe7cf74bd743a172
SHA17d2df84172c03dcf683ee4918adbe0d46f294613
SHA256d8202acc290e7bcab6d0d546c6d0b893e680ba36ae6f760c47042fd69a6c2291
SHA512771d1475b3bbbbe9bf55ba8aea0a495db52e14cdd96a1dcc1a21f31de6714c2c06796f98997810ffa2693c8282c95f5bbd0b97ec7f458b9a16936e831edf104a
-
Filesize
14KB
MD538f2cd92fe05e48fa73cd5a265e92d4d
SHA1975d81a51a1284b585ea8d59d82cc01dc5966707
SHA2560ac6a2f3165df174e14c87f6d88e744cc4ea5483215a27c28b1fc903ad9433a0
SHA512e2eb1ddf0587d6efae6ea32b9e07cecb3861f0dc4559e0604cc8871bd285fbca804f54ca2e81016603c1a63ec36a47c12f6a3ef8c8e1b383dd8712bb90e45aa0
-
Filesize
16KB
MD5365bd1843db6d4f6ef917b6148e1aed4
SHA19ec890f55cbba57b86370b68c305f06ca17fbe90
SHA256cacaa6dc6b022b564d5759f4fff9f75ae6261a100322973cd7efd238ad1e6830
SHA5128dee95111855870248eedbe0500e65a029847d827b28d1cce08d37f88f297e3d61ff7ad0d46caf61609e0a87046c884e4e8ac374e65ce9c04d930fe671598587
-
Filesize
16KB
MD59f3904195c62c7dbf0e4438b1bd586ca
SHA16f94c64bbf7a971f36b6ae9968fb6713a7b81f92
SHA256ce78dd2d6f97c495bbcd1d5efbc7110421471780ba46f07f7152cf434a980293
SHA5125f87b822fc6422fe69acaf50a43865f3b5c7ab3e988f962f126af1fa5a1040953d150294ea733c23e1f9dcd71bde55b0925185f25015f416c52972ace6fa026b
-
Filesize
1KB
MD5c502add5b4b1cc69058450aab61ef5b0
SHA1dc003bbac472e54776e8ef5cb9b4c6e2a0ab60b7
SHA256f2377e1b2aa931733767ab1272dfe169eb6e55a09f01e198bfe6402998ea03d6
SHA5126e544c04a83f30f7a0ac0df6b61e18e8203ced4b0729d670a96c369bc87d68f746f0dee91eff2c0818763effee55115a6c0a31a3a928d8fcda917dc6d4cd1ab4
-
Filesize
4KB
MD59b2b7a83c1139d39be992747799f58c2
SHA1d0231ed4db27a3a378d7d7d4ab27d6279ba29a21
SHA256a11ee73d4156219312c46d8ae07f18a0335c4c702c888afb611eee8872c994fc
SHA512f3c8adc2790d906aeb0ea547b3369bdf4e8d38da27ca453027561baafee44afe4f3f0e91424fa2d854de6eba1a5c40e6fdfeb7914fb7751f50babc14d0d143d8
-
Filesize
5KB
MD5662328e44682aadbd2e506648f2599d4
SHA12cd08a3cb0a13591f6bca7bba5f92b8db9133c22
SHA256b65c68f06393910ae355cbbe477392edc77c22c8033614fa8bd6d2343492fe09
SHA5124de966c44b5d68eaf800086ee4526a6fd8ff0eae0157a249407e07e1c371e6fc6a1f7961e861dde903caa17e35d9748a9d8a4223fe497ccdd62b4ae307b23dc9
-
Filesize
171KB
MD500e6ce5230d6c9748476c8c13e791e6b
SHA1865214eccdf29129c277074a0a67c68102639584
SHA25653ddbf4403280683ffbbf83beca36d6e8bb1b55d54bbeacf1594cbb71b6ea79d
SHA51268a0615a689bfe609751dba2f2fa5ae1b541f11e48e4d3f8f27e27b527ae0c2d95f587f751ac7da8c095495fa9754ff10d08126a2cf99224e92f0cd1c1321677