Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
d5ba5cb09697a8ba54c7444dcbcc3153.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d5ba5cb09697a8ba54c7444dcbcc3153.exe
Resource
win10v2004-20240226-en
General
-
Target
d5ba5cb09697a8ba54c7444dcbcc3153.exe
-
Size
141KB
-
MD5
d5ba5cb09697a8ba54c7444dcbcc3153
-
SHA1
977e1a973ecd010319290b8cc91fe856911f2503
-
SHA256
a15b0ee8d72594b4037c9b6ff1d766e2ebb3d2ca5b96c4898956d7977a396d1e
-
SHA512
a1f2bd4122c9baac4357d41db4ad1a875b44c4243b29bd0343fbfc2e23cee3b97738a19085928f5c98030cd947c205cdb6657de65a9dfc3954b0515e13b442ab
-
SSDEEP
3072:hbBNtO8GAlO2qyG8bH3gKjBb3AWOpOEpBMkNrAPEB68ErsP/24lcqj:FBNtJtHqX0gi6WAOgBMpEBLErsP/24lH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2636 wyiz.exe -
Loads dropped DLL 2 IoCs
pid Process 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\{81C51406-4F72-EB4F-171D-F312EB121E52} = "C:\\Users\\Admin\\AppData\\Roaming\\Yxip\\wyiz.exe" wyiz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2616 set thread context of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Privacy d5ba5cb09697a8ba54c7444dcbcc3153.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d5ba5cb09697a8ba54c7444dcbcc3153.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\03284154-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe 2636 wyiz.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe Token: SeSecurityPrivilege 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe Token: SeSecurityPrivilege 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe Token: SeManageVolumePrivilege 1376 WinMail.exe Token: SeSecurityPrivilege 2308 cmd.exe Token: SeManageVolumePrivilege 2840 WinMail.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1376 WinMail.exe 2840 WinMail.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1376 WinMail.exe 2840 WinMail.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1376 WinMail.exe 2840 WinMail.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2636 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 28 PID 2616 wrote to memory of 2636 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 28 PID 2616 wrote to memory of 2636 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 28 PID 2616 wrote to memory of 2636 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 28 PID 2636 wrote to memory of 1100 2636 wyiz.exe 19 PID 2636 wrote to memory of 1100 2636 wyiz.exe 19 PID 2636 wrote to memory of 1100 2636 wyiz.exe 19 PID 2636 wrote to memory of 1100 2636 wyiz.exe 19 PID 2636 wrote to memory of 1100 2636 wyiz.exe 19 PID 2636 wrote to memory of 1160 2636 wyiz.exe 20 PID 2636 wrote to memory of 1160 2636 wyiz.exe 20 PID 2636 wrote to memory of 1160 2636 wyiz.exe 20 PID 2636 wrote to memory of 1160 2636 wyiz.exe 20 PID 2636 wrote to memory of 1160 2636 wyiz.exe 20 PID 2636 wrote to memory of 1200 2636 wyiz.exe 21 PID 2636 wrote to memory of 1200 2636 wyiz.exe 21 PID 2636 wrote to memory of 1200 2636 wyiz.exe 21 PID 2636 wrote to memory of 1200 2636 wyiz.exe 21 PID 2636 wrote to memory of 1200 2636 wyiz.exe 21 PID 2636 wrote to memory of 1760 2636 wyiz.exe 23 PID 2636 wrote to memory of 1760 2636 wyiz.exe 23 PID 2636 wrote to memory of 1760 2636 wyiz.exe 23 PID 2636 wrote to memory of 1760 2636 wyiz.exe 23 PID 2636 wrote to memory of 1760 2636 wyiz.exe 23 PID 2636 wrote to memory of 2616 2636 wyiz.exe 27 PID 2636 wrote to memory of 2616 2636 wyiz.exe 27 PID 2636 wrote to memory of 2616 2636 wyiz.exe 27 PID 2636 wrote to memory of 2616 2636 wyiz.exe 27 PID 2636 wrote to memory of 2616 2636 wyiz.exe 27 PID 2636 wrote to memory of 1376 2636 wyiz.exe 29 PID 2636 wrote to memory of 1376 2636 wyiz.exe 29 PID 2636 wrote to memory of 1376 2636 wyiz.exe 29 PID 2636 wrote to memory of 1376 2636 wyiz.exe 29 PID 2636 wrote to memory of 1376 2636 wyiz.exe 29 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2616 wrote to memory of 2308 2616 d5ba5cb09697a8ba54c7444dcbcc3153.exe 30 PID 2636 wrote to memory of 1924 2636 wyiz.exe 32 PID 2636 wrote to memory of 1924 2636 wyiz.exe 32 PID 2636 wrote to memory of 1924 2636 wyiz.exe 32 PID 2636 wrote to memory of 1924 2636 wyiz.exe 32 PID 2636 wrote to memory of 1924 2636 wyiz.exe 32 PID 2636 wrote to memory of 3048 2636 wyiz.exe 34 PID 2636 wrote to memory of 3048 2636 wyiz.exe 34 PID 2636 wrote to memory of 3048 2636 wyiz.exe 34 PID 2636 wrote to memory of 3048 2636 wyiz.exe 34 PID 2636 wrote to memory of 3048 2636 wyiz.exe 34 PID 2636 wrote to memory of 2856 2636 wyiz.exe 35 PID 2636 wrote to memory of 2856 2636 wyiz.exe 35 PID 2636 wrote to memory of 2856 2636 wyiz.exe 35 PID 2636 wrote to memory of 2856 2636 wyiz.exe 35 PID 2636 wrote to memory of 2856 2636 wyiz.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\d5ba5cb09697a8ba54c7444dcbcc3153.exe"C:\Users\Admin\AppData\Local\Temp\d5ba5cb09697a8ba54c7444dcbcc3153.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\Yxip\wyiz.exe"C:\Users\Admin\AppData\Roaming\Yxip\wyiz.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7675ea06.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1760
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1376
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1924
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2840
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3048
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558B
MD53cc0012f96f8f44164c18d7de05023d9
SHA1c8feb560d751fe720c8bdb53f5e78aa92abb9a9e
SHA2562654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5
SHA512626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55509ac92bb8e69e6dfd82cc7a2732cb6
SHA189651975bc6c8bcd7311d73b77d892244e57890a
SHA2564f2871ac413fb0c697edd74a6cd7868849e10892a991b972df7c5372537ea406
SHA512597248fdfeebc5e7ad0e56bc5d756a271bbdcbb49efa792e38a354b6173a83a0d345e8f955ca071f6316f88e8acd7d6a49efdbe491f3942c3889be7a61d7b554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735
Filesize232B
MD51193a4368fc363bc9cd709aa3795029e
SHA1ba983a62ea937ac8f2a4b0d8c9c14f44b36a7edd
SHA256e9f07b6485a796aa5b4c3956e87b8033f54f7f2e596c79795dcf932316728c39
SHA512bfa73225fa0b79ff9a3431a0f2b575f20496511a756c08bf053e6952f46edded9e344646dc12f0c8c2f3b12c0b6e7d24d51047299eccf1b7de643e21a68bb64f
-
Filesize
2.0MB
MD5f0558a700769ef92cf6fe4190924be70
SHA1ae5224403588cf0dd833490012261a4b1d537e08
SHA256f6ad27945536ef67fb025d508a9019cece322b6fd236ce01ead467075a55835a
SHA512edd69fe395a682f7958ff2c783271d9c1ab593946481a3c0c4a69fac83992429a82dd0c6cecd9e3d4be9e51c13a478607ddbd535b1eab4cd279e1c331e1edd7b
-
Filesize
8KB
MD5b40d6577147e083cd6270b7c330cb993
SHA1b69d848620ee72bf0d6f0c4690dfdae5fd8b3e5c
SHA2565cc258767264984c1aae3807cca9d3421e6aa8bb7b222c9dda364c14425045c8
SHA5126347283198a4b4074ece4b244dbefa9ac680b9a48ada2a2e06e3a6fa91014ca29d6501822127c0f6908906b20dccb4d29939dc68bbefa94ba4e6a8167cd9b2a7
-
Filesize
2.0MB
MD550d32ab0a593c4b221dd46599d8411b9
SHA12d15e278245455046eb6b7e401036fb9dbd1ebe7
SHA256ac9d952ecdc5448ffce8ff1d8613d0adf1e56b43a166eaff4e969cac4511bda8
SHA512442be56b9156473fa24ebf703023895ad090da6240298aab077cba86d3db3f9b563c03406587e016762662c5fb5f6fa380bcca8174482cf043e85aade5af0f94
-
Filesize
2.0MB
MD58bf18b77a95dec1f3c317e171d9430c6
SHA16a1b0bd4a69c3dedc3efcb559ef87e5144ea253e
SHA256516849eb2d05e9d763bbe4667c62ef8e1dcd5afdad03b33cf65c3bfbc65769e8
SHA5127e7ab9274eb31fd8384dcc0736b74e3449375b8c3f40fe7e10de003c7a660ad9773780e3a8eb653780d284e98bee2af8d49dff375b1d21f66ef012a993c733bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
243B
MD5e700f6e0a4bea301ee355b1b617d5e93
SHA1114068411452754fa4ee4cc773df5b30f1e04143
SHA256e23c7d567e2b36e17318d3f540b11cd749c793171eb3b587313cc885cee61337
SHA512b39f8e806c4dc44c8e6c2153bb2ae7fcffa8d7d3e4f8f5e42011cea94f808387ee4e8e72e9e04fbeebf9fe4c47c2721adfbd802523c700af6648fe6be2c91a50
-
Filesize
366B
MD5806a84b248a6a6560206168435a54fdc
SHA15a9b150ce446122b1ad9acad94d7ab52af988cba
SHA256ae2ee9953449e48de2cb3694f0b35f9e18c627cddbc0d6f1182b17b2b95184fc
SHA512a3f871c19993c6ef5a2dfa277de28abcea61d5eb42aec9ccfe14c8a51f9fe34c2188ffdd535b2ad53d8d02ecadef1646d6f676ed7b4ad90ab7fc6bd0f5d6273a
-
Filesize
141KB
MD5813a52d58bc13e00ece168ccc8c35dbe
SHA1979099d320c65f29d87df5f387fd4a014661a99f
SHA256ec1dfedf0116d6f235bbb66067b6c244a76baa04a651a6539c05e7bc9f1f33ee
SHA5121bc85b9c2adc7bdc37c0d29eba416d9939e4cba8aa8f83e2e18c58da88fe834cdce37c0cabe19a8c7ccd262053b5f32999ea159322be316d086686c6eb5523af