Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe
Resource
win10v2004-20240226-en
General
-
Target
122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe
-
Size
403KB
-
MD5
2f1d6db9af7a44f4402394c090f583b0
-
SHA1
844c8516191d9d55e4c25fad9c93a7a2119161dc
-
SHA256
122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9
-
SHA512
f34778922dc1c18a96d67368692a8a3ea7a98f0ec5942710e9bb044de16005a3478650fca2b71adddbf4c72b8178565130e71929d6a7b0b928256fd70f9082be
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 3 2268 rundll32.exe 5 2268 rundll32.exe 6 2268 rundll32.exe 7 2268 rundll32.exe 8 2268 rundll32.exe 9 2268 rundll32.exe 10 2268 rundll32.exe 11 2268 rundll32.exe 13 2268 rundll32.exe 14 2268 rundll32.exe -
Deletes itself 1 IoCs
pid Process 2932 qmsphbiu.exe -
Executes dropped EXE 1 IoCs
pid Process 2932 qmsphbiu.exe -
Loads dropped DLL 6 IoCs
pid Process 548 cmd.exe 548 cmd.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dotx = "c:\\windows\\SysWOW64\\rundll32.exe \"c:\\Program Files\\xkafymb\\dezps.dll\",Verify" rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: rundll32.exe File opened (read-only) \??\p: rundll32.exe File opened (read-only) \??\s: rundll32.exe File opened (read-only) \??\v: rundll32.exe File opened (read-only) \??\y: rundll32.exe File opened (read-only) \??\e: rundll32.exe File opened (read-only) \??\h: rundll32.exe File opened (read-only) \??\q: rundll32.exe File opened (read-only) \??\x: rundll32.exe File opened (read-only) \??\g: rundll32.exe File opened (read-only) \??\b: rundll32.exe File opened (read-only) \??\j: rundll32.exe File opened (read-only) \??\o: rundll32.exe File opened (read-only) \??\u: rundll32.exe File opened (read-only) \??\a: rundll32.exe File opened (read-only) \??\l: rundll32.exe File opened (read-only) \??\m: rundll32.exe File opened (read-only) \??\n: rundll32.exe File opened (read-only) \??\r: rundll32.exe File opened (read-only) \??\t: rundll32.exe File opened (read-only) \??\w: rundll32.exe File opened (read-only) \??\z: rundll32.exe File opened (read-only) \??\k: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2268 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\xkafymb qmsphbiu.exe File created \??\c:\Program Files\xkafymb\dezps.dll qmsphbiu.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2368 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2268 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe 2932 qmsphbiu.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2416 wrote to memory of 548 2416 122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe 28 PID 2416 wrote to memory of 548 2416 122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe 28 PID 2416 wrote to memory of 548 2416 122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe 28 PID 2416 wrote to memory of 548 2416 122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe 28 PID 548 wrote to memory of 2368 548 cmd.exe 30 PID 548 wrote to memory of 2368 548 cmd.exe 30 PID 548 wrote to memory of 2368 548 cmd.exe 30 PID 548 wrote to memory of 2368 548 cmd.exe 30 PID 548 wrote to memory of 2932 548 cmd.exe 31 PID 548 wrote to memory of 2932 548 cmd.exe 31 PID 548 wrote to memory of 2932 548 cmd.exe 31 PID 548 wrote to memory of 2932 548 cmd.exe 31 PID 2932 wrote to memory of 2268 2932 qmsphbiu.exe 32 PID 2932 wrote to memory of 2268 2932 qmsphbiu.exe 32 PID 2932 wrote to memory of 2268 2932 qmsphbiu.exe 32 PID 2932 wrote to memory of 2268 2932 qmsphbiu.exe 32 PID 2932 wrote to memory of 2268 2932 qmsphbiu.exe 32 PID 2932 wrote to memory of 2268 2932 qmsphbiu.exe 32 PID 2932 wrote to memory of 2268 2932 qmsphbiu.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe"C:\Users\Admin\AppData\Local\Temp\122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\qmsphbiu.exe "C:\Users\Admin\AppData\Local\Temp\122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\qmsphbiu.exeC:\Users\Admin\AppData\Local\Temp\\qmsphbiu.exe "C:\Users\Admin\AppData\Local\Temp\122dd56cea522d7ca5209c2ff7b0b74a6112b992ebc1a8541ea5a29737e8f0a9.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.exe "c:\Program Files\xkafymb\dezps.dll",Verify C:\Users\Admin\AppData\Local\Temp\qmsphbiu.exe4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5c34ffa1033d3ee5ab806b346be3775b7
SHA1004616a15b10512ce302fb17dcd93cc7332fa1cf
SHA2560e0274a5820194b23241188ca5364f996850f1dc5d71f1c8fd934f15431ba02b
SHA512e7b376c9d84b21b0c2f2b2795d4e0b34fe86d978e0151059fa7e591a99c4abb925d9cc736de76b581d7c1a3a4a896e78878954c4171b77df15766db9016827f4
-
Filesize
403KB
MD5871c8d23c2b58ddd9bc366abfe02f779
SHA1ed96c87e76d45abc40b0e91384cb97bc47395976
SHA25671ed3e5fcc59fad07f2f6afea4563282b3121d109f8df11247482daab32e8893
SHA51273eb23ee7d6839fa7530f7a2ecb4f3269107df58ecae0b4d6266fb5101b5f57881f1c55b956f2d22ea1e0fd23eb3db80e05e9fde26978e8b3f4311cb1d3417b8