Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
df68efb674b30e3c367ba59b823afb29.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
df68efb674b30e3c367ba59b823afb29.exe
Resource
win10v2004-20240226-en
General
-
Target
df68efb674b30e3c367ba59b823afb29.exe
-
Size
321KB
-
MD5
df68efb674b30e3c367ba59b823afb29
-
SHA1
7408e49181a50cf41a42507f8f9eccc22d7ab799
-
SHA256
36b190f8fb5a27e417b1bc6c11d5fdca21cd13b8e0fdb027a40d50a39fa5e255
-
SHA512
e4a027b3eb6f318a194281cd43ce575dc77598cefb8846d14d01d3af914dc9f9cdac0c1439a9199a350d0a9ec7b5fa88dabadb38e4b2449d2b96ae3514ecb554
-
SSDEEP
6144:2wTTuHg4DQC6ziRo0sYXkvDm5TsCQIaNEN4xxgBuixuqFsE6a7ZR:DopF6K1diUIIaNniBunq+nar
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2880 idkae.exe -
Loads dropped DLL 2 IoCs
pid Process 2180 df68efb674b30e3c367ba59b823afb29.exe 2180 df68efb674b30e3c367ba59b823afb29.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F08D48C8-DA76-AD4E-F540-ECC2E1DBCFDF} = "C:\\Users\\Admin\\AppData\\Roaming\\Utopej\\idkae.exe" idkae.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1556 944 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy df68efb674b30e3c367ba59b823afb29.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" df68efb674b30e3c367ba59b823afb29.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe 2880 idkae.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2180 df68efb674b30e3c367ba59b823afb29.exe Token: SeSecurityPrivilege 2180 df68efb674b30e3c367ba59b823afb29.exe Token: SeSecurityPrivilege 2180 df68efb674b30e3c367ba59b823afb29.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2180 df68efb674b30e3c367ba59b823afb29.exe 2880 idkae.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2880 2180 df68efb674b30e3c367ba59b823afb29.exe 28 PID 2180 wrote to memory of 2880 2180 df68efb674b30e3c367ba59b823afb29.exe 28 PID 2180 wrote to memory of 2880 2180 df68efb674b30e3c367ba59b823afb29.exe 28 PID 2180 wrote to memory of 2880 2180 df68efb674b30e3c367ba59b823afb29.exe 28 PID 2880 wrote to memory of 1120 2880 idkae.exe 19 PID 2880 wrote to memory of 1120 2880 idkae.exe 19 PID 2880 wrote to memory of 1120 2880 idkae.exe 19 PID 2880 wrote to memory of 1120 2880 idkae.exe 19 PID 2880 wrote to memory of 1120 2880 idkae.exe 19 PID 2880 wrote to memory of 1224 2880 idkae.exe 20 PID 2880 wrote to memory of 1224 2880 idkae.exe 20 PID 2880 wrote to memory of 1224 2880 idkae.exe 20 PID 2880 wrote to memory of 1224 2880 idkae.exe 20 PID 2880 wrote to memory of 1224 2880 idkae.exe 20 PID 2880 wrote to memory of 1256 2880 idkae.exe 21 PID 2880 wrote to memory of 1256 2880 idkae.exe 21 PID 2880 wrote to memory of 1256 2880 idkae.exe 21 PID 2880 wrote to memory of 1256 2880 idkae.exe 21 PID 2880 wrote to memory of 1256 2880 idkae.exe 21 PID 2880 wrote to memory of 1652 2880 idkae.exe 23 PID 2880 wrote to memory of 1652 2880 idkae.exe 23 PID 2880 wrote to memory of 1652 2880 idkae.exe 23 PID 2880 wrote to memory of 1652 2880 idkae.exe 23 PID 2880 wrote to memory of 1652 2880 idkae.exe 23 PID 2880 wrote to memory of 2180 2880 idkae.exe 27 PID 2880 wrote to memory of 2180 2880 idkae.exe 27 PID 2880 wrote to memory of 2180 2880 idkae.exe 27 PID 2880 wrote to memory of 2180 2880 idkae.exe 27 PID 2880 wrote to memory of 2180 2880 idkae.exe 27 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 2180 wrote to memory of 944 2180 df68efb674b30e3c367ba59b823afb29.exe 29 PID 944 wrote to memory of 1556 944 cmd.exe 31 PID 944 wrote to memory of 1556 944 cmd.exe 31 PID 944 wrote to memory of 1556 944 cmd.exe 31 PID 944 wrote to memory of 1556 944 cmd.exe 31 PID 2880 wrote to memory of 1676 2880 idkae.exe 30 PID 2880 wrote to memory of 1676 2880 idkae.exe 30 PID 2880 wrote to memory of 1676 2880 idkae.exe 30 PID 2880 wrote to memory of 1676 2880 idkae.exe 30 PID 2880 wrote to memory of 1676 2880 idkae.exe 30 PID 2880 wrote to memory of 1556 2880 idkae.exe 31 PID 2880 wrote to memory of 1556 2880 idkae.exe 31 PID 2880 wrote to memory of 1556 2880 idkae.exe 31 PID 2880 wrote to memory of 1556 2880 idkae.exe 31 PID 2880 wrote to memory of 1556 2880 idkae.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\df68efb674b30e3c367ba59b823afb29.exe"C:\Users\Admin\AppData\Local\Temp\df68efb674b30e3c367ba59b823afb29.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Roaming\Utopej\idkae.exe"C:\Users\Admin\AppData\Roaming\Utopej\idkae.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8fa77cda.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 1124⤵
- Program crash
PID:1556
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1652
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2016524993106840588312773213151382091468-1684313077-1872060101-738079523787781196"1⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366B
MD553390ff578e6afb949af05f86456eede
SHA1cada52f3d5afec049608f944d0b4da10db3769be
SHA256ebcb7255f3ca5145f86419a8965dd5ab01f375c93620b23db1256bff0f635d59
SHA512a23f4ec1f452fe6a98f5900b755933f0a001399986fc2baf4daa8ca8347b080fe83ba2432d3a423cd5506e66fbdab7128409de00933862cf532c129394e6b436
-
Filesize
321KB
MD531f595fdceb93d4c7b5b1107f86f2009
SHA1adddfc699e132b9e458ac98e1e4bf5a77f5a1f97
SHA25624fd46cbd4b60b224099b02e9c56aef4f3ae94bd9250ae8b08c637f6dded224c
SHA51247a9086a72aaae6f1bda00b7ba29b0795c41efd3e35cdcd963cad142e90711de393b35e81b22a3c02c1a3e3fecda371fe9b3af0d89080bc4522b1f5e41ffe8ca