Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 16:20

General

  • Target

    d3f526c8767e900d243200bba821e3bf.exe

  • Size

    171KB

  • MD5

    d3f526c8767e900d243200bba821e3bf

  • SHA1

    a4941f9446d9f134e5ecec8f6c5b56d80e645e2c

  • SHA256

    20aaee1ac8fd694ad7dd941432676adb62160319b683636499541882031ff13e

  • SHA512

    b312518645b4ee1290aba14ece017d19fa6213dbba86ce8f7c7e03ca2d13131b2521c87602f521cbab302722e46e89ac981f713a83f7ad2ed305de51167a327a

  • SSDEEP

    3072:bB4FJDDTw6EVSp0ydsKA/QcbM7f5CGg4I7DA5a/c2AHJyWza9q4iuOneRLaZmqQV:bBqDDs6asU7DA5F2Cyt9DGeRLaZmqsDJ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1248
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1328
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1372
          • C:\Users\Admin\AppData\Local\Temp\d3f526c8767e900d243200bba821e3bf.exe
            "C:\Users\Admin\AppData\Local\Temp\d3f526c8767e900d243200bba821e3bf.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2936
            • C:\Users\Admin\AppData\Roaming\Neohdy\ydoq.exe
              "C:\Users\Admin\AppData\Roaming\Neohdy\ydoq.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2872
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcf619caa.bat"
              3⤵
                PID:2392
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1520
            • C:\Program Files\Windows Mail\WinMail.exe
              "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
              1⤵
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:656
            • C:\Windows\system32\conhost.exe
              \??\C:\Windows\system32\conhost.exe "-108532438718756394631264413610-1954638340930373586-740353422-1076134592243291695"
              1⤵
                PID:2924
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:2632
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:2592
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:2196
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                      1⤵
                        PID:1776
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                        1⤵
                          PID:1924

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                          Filesize

                          2.0MB

                          MD5

                          d03b16b4405aa3b64bdabdfbb3257590

                          SHA1

                          67edfb3382f9d60031466f7562dfdf2569d449a3

                          SHA256

                          aefb04222d25c592f56c12cc807169ba5f90ca6b393c05cd506bd1b8035b933c

                          SHA512

                          d149ce804555f2117c3104ef8908676f6c59a69effdf2173c91d2d710be1b9459088fb4c3f92c646e242ae8e8ba17efd6d6829aa57fe10daf24d8caa9d053976

                        • C:\Users\Admin\AppData\Roaming\Ygruw\alke.hoo

                          Filesize

                          366B

                          MD5

                          5914d040d32ede8ec91043edc701785d

                          SHA1

                          3b0548dc6bc9c8a5df829f9a495187ebf3147d81

                          SHA256

                          27d3b89a944b8bc79e0b1550de36999984ebb6aa24e0a1950d2debaee866ba0b

                          SHA512

                          40f5aa9929d3740d7e4fb792fbc51aeea818728a8ec5ddf90e5cb356ba3e6e049edeed14363448f2b4675c45b919d41f9708f404351d13d7ca36eb268f1ebc50

                        • C:\debug.txt

                          Filesize

                          13KB

                          MD5

                          37867539fa4d6d795d6a230bdd0134e5

                          SHA1

                          3fdd8e8ee526af6b009df639122652d1a9e066eb

                          SHA256

                          cd9b269dbf25af7207b8fd276d51fb711a7aef7c5b3c677ddc0f43d2894a4a6b

                          SHA512

                          913716f3434f024d120d8b8c09966755942b2aeb3e524124da13604675b31c4caccc696c069f3211ce7108a66a4f213964f954d3113cd604ed36b4b32362bd8a

                        • C:\debug.txt

                          Filesize

                          3KB

                          MD5

                          f80cea5fdd71c6066dd0d4e25f483ffb

                          SHA1

                          c29649068a42b3a00a1bb45800ed4e5f65a158a5

                          SHA256

                          97b5404b842828147ef541909dd257b9b4da9886ea36d5716d60c4099b6a3c56

                          SHA512

                          aeaf7871c8ddbea80190c8cff1f7289c5915b2dc2cd9f3aa412d28c860bacb5cf851c8b3544e6d660ac3a765754c85be4d17e3a04a6f1df6fc373b8a25c966c4

                        • C:\debug.txt

                          Filesize

                          13KB

                          MD5

                          5843c155df84084cfe7cf74bd743a172

                          SHA1

                          7d2df84172c03dcf683ee4918adbe0d46f294613

                          SHA256

                          d8202acc290e7bcab6d0d546c6d0b893e680ba36ae6f760c47042fd69a6c2291

                          SHA512

                          771d1475b3bbbbe9bf55ba8aea0a495db52e14cdd96a1dcc1a21f31de6714c2c06796f98997810ffa2693c8282c95f5bbd0b97ec7f458b9a16936e831edf104a

                        • C:\debug.txt

                          Filesize

                          14KB

                          MD5

                          38f2cd92fe05e48fa73cd5a265e92d4d

                          SHA1

                          975d81a51a1284b585ea8d59d82cc01dc5966707

                          SHA256

                          0ac6a2f3165df174e14c87f6d88e744cc4ea5483215a27c28b1fc903ad9433a0

                          SHA512

                          e2eb1ddf0587d6efae6ea32b9e07cecb3861f0dc4559e0604cc8871bd285fbca804f54ca2e81016603c1a63ec36a47c12f6a3ef8c8e1b383dd8712bb90e45aa0

                        • C:\debug.txt

                          Filesize

                          16KB

                          MD5

                          365bd1843db6d4f6ef917b6148e1aed4

                          SHA1

                          9ec890f55cbba57b86370b68c305f06ca17fbe90

                          SHA256

                          cacaa6dc6b022b564d5759f4fff9f75ae6261a100322973cd7efd238ad1e6830

                          SHA512

                          8dee95111855870248eedbe0500e65a029847d827b28d1cce08d37f88f297e3d61ff7ad0d46caf61609e0a87046c884e4e8ac374e65ce9c04d930fe671598587

                        • C:\debug.txt

                          Filesize

                          16KB

                          MD5

                          9f3904195c62c7dbf0e4438b1bd586ca

                          SHA1

                          6f94c64bbf7a971f36b6ae9968fb6713a7b81f92

                          SHA256

                          ce78dd2d6f97c495bbcd1d5efbc7110421471780ba46f07f7152cf434a980293

                          SHA512

                          5f87b822fc6422fe69acaf50a43865f3b5c7ab3e988f962f126af1fa5a1040953d150294ea733c23e1f9dcd71bde55b0925185f25015f416c52972ace6fa026b

                        • C:\debug.txt

                          Filesize

                          1KB

                          MD5

                          c502add5b4b1cc69058450aab61ef5b0

                          SHA1

                          dc003bbac472e54776e8ef5cb9b4c6e2a0ab60b7

                          SHA256

                          f2377e1b2aa931733767ab1272dfe169eb6e55a09f01e198bfe6402998ea03d6

                          SHA512

                          6e544c04a83f30f7a0ac0df6b61e18e8203ced4b0729d670a96c369bc87d68f746f0dee91eff2c0818763effee55115a6c0a31a3a928d8fcda917dc6d4cd1ab4

                        • C:\debug.txt

                          Filesize

                          4KB

                          MD5

                          9b2b7a83c1139d39be992747799f58c2

                          SHA1

                          d0231ed4db27a3a378d7d7d4ab27d6279ba29a21

                          SHA256

                          a11ee73d4156219312c46d8ae07f18a0335c4c702c888afb611eee8872c994fc

                          SHA512

                          f3c8adc2790d906aeb0ea547b3369bdf4e8d38da27ca453027561baafee44afe4f3f0e91424fa2d854de6eba1a5c40e6fdfeb7914fb7751f50babc14d0d143d8

                        • C:\debug.txt

                          Filesize

                          5KB

                          MD5

                          662328e44682aadbd2e506648f2599d4

                          SHA1

                          2cd08a3cb0a13591f6bca7bba5f92b8db9133c22

                          SHA256

                          b65c68f06393910ae355cbbe477392edc77c22c8033614fa8bd6d2343492fe09

                          SHA512

                          4de966c44b5d68eaf800086ee4526a6fd8ff0eae0157a249407e07e1c371e6fc6a1f7961e861dde903caa17e35d9748a9d8a4223fe497ccdd62b4ae307b23dc9

                        • \Users\Admin\AppData\Roaming\Neohdy\ydoq.exe

                          Filesize

                          171KB

                          MD5

                          00e6ce5230d6c9748476c8c13e791e6b

                          SHA1

                          865214eccdf29129c277074a0a67c68102639584

                          SHA256

                          53ddbf4403280683ffbbf83beca36d6e8bb1b55d54bbeacf1594cbb71b6ea79d

                          SHA512

                          68a0615a689bfe609751dba2f2fa5ae1b541f11e48e4d3f8f27e27b527ae0c2d95f587f751ac7da8c095495fa9754ff10d08126a2cf99224e92f0cd1c1321677

                        • memory/1248-44-0x0000000000210000-0x000000000023F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1248-43-0x0000000000210000-0x000000000023F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1248-42-0x0000000000210000-0x000000000023F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1248-41-0x0000000000210000-0x000000000023F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1248-39-0x0000000000210000-0x000000000023F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1328-50-0x0000000001DB0000-0x0000000001DDF000-memory.dmp

                          Filesize

                          188KB

                        • memory/1328-51-0x0000000001DB0000-0x0000000001DDF000-memory.dmp

                          Filesize

                          188KB

                        • memory/1328-53-0x0000000001DB0000-0x0000000001DDF000-memory.dmp

                          Filesize

                          188KB

                        • memory/1328-52-0x0000000001DB0000-0x0000000001DDF000-memory.dmp

                          Filesize

                          188KB

                        • memory/1372-59-0x0000000002A10000-0x0000000002A3F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1372-60-0x0000000002A10000-0x0000000002A3F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1372-62-0x0000000002A10000-0x0000000002A3F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1372-61-0x0000000002A10000-0x0000000002A3F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1520-68-0x0000000001D80000-0x0000000001DAF000-memory.dmp

                          Filesize

                          188KB

                        • memory/1520-69-0x0000000001D80000-0x0000000001DAF000-memory.dmp

                          Filesize

                          188KB

                        • memory/1520-70-0x0000000001D80000-0x0000000001DAF000-memory.dmp

                          Filesize

                          188KB

                        • memory/1520-71-0x0000000001D80000-0x0000000001DAF000-memory.dmp

                          Filesize

                          188KB

                        • memory/2392-360-0x0000000077D90000-0x0000000077D91000-memory.dmp

                          Filesize

                          4KB

                        • memory/2392-427-0x0000000000150000-0x000000000017F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2392-358-0x0000000000150000-0x000000000017F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2936-80-0x0000000000330000-0x000000000035F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2936-104-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-102-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-94-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-92-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-88-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-106-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-81-0x0000000000330000-0x000000000035F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2936-79-0x0000000000330000-0x000000000035F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2936-114-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-78-0x0000000000330000-0x000000000035F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2936-77-0x0000000000330000-0x000000000035F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2936-116-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-118-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-120-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-122-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-124-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-191-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-126-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-110-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-112-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-108-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-351-0x0000000000330000-0x000000000035F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2936-98-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-100-0x0000000077D90000-0x0000000077D91000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-99-0x0000000000330000-0x000000000035F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2936-96-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/2936-90-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB