Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
e898eca29a80a90dc080efda283ad1c0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e898eca29a80a90dc080efda283ad1c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
e898eca29a80a90dc080efda283ad1c0N.exe
-
Size
188KB
-
MD5
e898eca29a80a90dc080efda283ad1c0
-
SHA1
3bc8b6da66d60a40c13eb763d40ebc7b797048fa
-
SHA256
490abdd38ede660b5d7bf832f887884840f007b41e1682de86141b5acc01bbf7
-
SHA512
e014325be53d5fa534ee3fa6d17bc722d05161793c672a0c16564023e60083a2a10f4e63d85d0457da9eca284f0f10b07168158d305c839b72f2b53d531a46f5
-
SSDEEP
3072:TbHdyUQ9Do5J+FJCk1AerDtsr3vhqhEN4MAH+mbPepZBC8qzNJSKrDco:l5Q9D6+FJCk1AelhEN4MujGJoSoDco
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bopknhjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cobhdhha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckiiiine.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbikig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bopknhjd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdcjgnbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdcjgnbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbikig32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ckiiiine.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clhecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Clhecl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e898eca29a80a90dc080efda283ad1c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" e898eca29a80a90dc080efda283ad1c0N.exe -
Executes dropped EXE 7 IoCs
pid Process 2564 Bbikig32.exe 2132 Bopknhjd.exe 2912 Cobhdhha.exe 2068 Ckiiiine.exe 2644 Clhecl32.exe 2636 Cdcjgnbc.exe 2140 Coindgbi.exe -
Loads dropped DLL 14 IoCs
pid Process 804 e898eca29a80a90dc080efda283ad1c0N.exe 804 e898eca29a80a90dc080efda283ad1c0N.exe 2564 Bbikig32.exe 2564 Bbikig32.exe 2132 Bopknhjd.exe 2132 Bopknhjd.exe 2912 Cobhdhha.exe 2912 Cobhdhha.exe 2068 Ckiiiine.exe 2068 Ckiiiine.exe 2644 Clhecl32.exe 2644 Clhecl32.exe 2636 Cdcjgnbc.exe 2636 Cdcjgnbc.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cdcjgnbc.exe Clhecl32.exe File created C:\Windows\SysWOW64\Coindgbi.exe Cdcjgnbc.exe File created C:\Windows\SysWOW64\Pdgmbedh.dll e898eca29a80a90dc080efda283ad1c0N.exe File created C:\Windows\SysWOW64\Ckiiiine.exe Cobhdhha.exe File created C:\Windows\SysWOW64\Clhecl32.exe Ckiiiine.exe File opened for modification C:\Windows\SysWOW64\Clhecl32.exe Ckiiiine.exe File created C:\Windows\SysWOW64\Lfehem32.dll Ckiiiine.exe File created C:\Windows\SysWOW64\Ohodgb32.dll Cdcjgnbc.exe File opened for modification C:\Windows\SysWOW64\Bbikig32.exe e898eca29a80a90dc080efda283ad1c0N.exe File created C:\Windows\SysWOW64\Cbiphidl.dll Bbikig32.exe File created C:\Windows\SysWOW64\Cobhdhha.exe Bopknhjd.exe File opened for modification C:\Windows\SysWOW64\Ckiiiine.exe Cobhdhha.exe File opened for modification C:\Windows\SysWOW64\Coindgbi.exe Cdcjgnbc.exe File created C:\Windows\SysWOW64\Bbikig32.exe e898eca29a80a90dc080efda283ad1c0N.exe File created C:\Windows\SysWOW64\Bopknhjd.exe Bbikig32.exe File opened for modification C:\Windows\SysWOW64\Cobhdhha.exe Bopknhjd.exe File created C:\Windows\SysWOW64\Hkfggj32.dll Bopknhjd.exe File created C:\Windows\SysWOW64\Cdcjgnbc.exe Clhecl32.exe File opened for modification C:\Windows\SysWOW64\Bopknhjd.exe Bbikig32.exe File created C:\Windows\SysWOW64\Jchbfbij.dll Cobhdhha.exe File created C:\Windows\SysWOW64\Iafehn32.dll Clhecl32.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbikig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bopknhjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cobhdhha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckiiiine.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clhecl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdcjgnbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coindgbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e898eca29a80a90dc080efda283ad1c0N.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID e898eca29a80a90dc080efda283ad1c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" e898eca29a80a90dc080efda283ad1c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bopknhjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfehem32.dll" Ckiiiine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohodgb32.dll" Cdcjgnbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node e898eca29a80a90dc080efda283ad1c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbiphidl.dll" Bbikig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckiiiine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Clhecl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 e898eca29a80a90dc080efda283ad1c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbikig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ckiiiine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iafehn32.dll" Clhecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cdcjgnbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cobhdhha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} e898eca29a80a90dc080efda283ad1c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdgmbedh.dll" e898eca29a80a90dc080efda283ad1c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bbikig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkfggj32.dll" Bopknhjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bopknhjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jchbfbij.dll" Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Clhecl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cdcjgnbc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 804 wrote to memory of 2564 804 e898eca29a80a90dc080efda283ad1c0N.exe 30 PID 804 wrote to memory of 2564 804 e898eca29a80a90dc080efda283ad1c0N.exe 30 PID 804 wrote to memory of 2564 804 e898eca29a80a90dc080efda283ad1c0N.exe 30 PID 804 wrote to memory of 2564 804 e898eca29a80a90dc080efda283ad1c0N.exe 30 PID 2564 wrote to memory of 2132 2564 Bbikig32.exe 31 PID 2564 wrote to memory of 2132 2564 Bbikig32.exe 31 PID 2564 wrote to memory of 2132 2564 Bbikig32.exe 31 PID 2564 wrote to memory of 2132 2564 Bbikig32.exe 31 PID 2132 wrote to memory of 2912 2132 Bopknhjd.exe 32 PID 2132 wrote to memory of 2912 2132 Bopknhjd.exe 32 PID 2132 wrote to memory of 2912 2132 Bopknhjd.exe 32 PID 2132 wrote to memory of 2912 2132 Bopknhjd.exe 32 PID 2912 wrote to memory of 2068 2912 Cobhdhha.exe 33 PID 2912 wrote to memory of 2068 2912 Cobhdhha.exe 33 PID 2912 wrote to memory of 2068 2912 Cobhdhha.exe 33 PID 2912 wrote to memory of 2068 2912 Cobhdhha.exe 33 PID 2068 wrote to memory of 2644 2068 Ckiiiine.exe 34 PID 2068 wrote to memory of 2644 2068 Ckiiiine.exe 34 PID 2068 wrote to memory of 2644 2068 Ckiiiine.exe 34 PID 2068 wrote to memory of 2644 2068 Ckiiiine.exe 34 PID 2644 wrote to memory of 2636 2644 Clhecl32.exe 35 PID 2644 wrote to memory of 2636 2644 Clhecl32.exe 35 PID 2644 wrote to memory of 2636 2644 Clhecl32.exe 35 PID 2644 wrote to memory of 2636 2644 Clhecl32.exe 35 PID 2636 wrote to memory of 2140 2636 Cdcjgnbc.exe 36 PID 2636 wrote to memory of 2140 2636 Cdcjgnbc.exe 36 PID 2636 wrote to memory of 2140 2636 Cdcjgnbc.exe 36 PID 2636 wrote to memory of 2140 2636 Cdcjgnbc.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\e898eca29a80a90dc080efda283ad1c0N.exe"C:\Users\Admin\AppData\Local\Temp\e898eca29a80a90dc080efda283ad1c0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\Bbikig32.exeC:\Windows\system32\Bbikig32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Bopknhjd.exeC:\Windows\system32\Bopknhjd.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Cobhdhha.exeC:\Windows\system32\Cobhdhha.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Ckiiiine.exeC:\Windows\system32\Ckiiiine.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\Clhecl32.exeC:\Windows\system32\Clhecl32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Cdcjgnbc.exeC:\Windows\system32\Cdcjgnbc.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Coindgbi.exeC:\Windows\system32\Coindgbi.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5e2ebeff5f076e7fa7bb68552b08c1d82
SHA1cea59b4e25db7dd112e3488dfe8b8ea02fa178e8
SHA256357a270169a59eb2e45220df0f5ed9be16ab20b95f485652f6c7a8cb0ce5be33
SHA512cac12fbc93fff427b02f3bd62e01ac986bafba6feafe8ad068fbf7e8510660831833b670e0489754c367c440c9bddd3e603d556c145f784fd7812e06ab3e369e
-
Filesize
188KB
MD5611de04df2f01e194ee84921d7d54f22
SHA19446e6a65257c6fee63bb9d955fd73191504f537
SHA256f7668270c7df6c067368e75153cc32b1552086d74910e7fdcb27e9125deda584
SHA5120439639636891be5173a8e9c0de72fd187f40d0e51651503c5b9a297780bb47144492ae1a9cff5dcd2bcd04343e3b50730e260f79b46c16d37e59cf4283226bd
-
Filesize
188KB
MD555027d8f2908da26e4a8c938ddc520ef
SHA11141ca60b5f2432b6444c3ca7cb5f523b007da15
SHA25664bdc9a84939e87573307742652b121021789ddb503c8d3cdcb2889d4721091c
SHA512b779d5856f9a50e1053c6c86bd59b7e992d56aef16f87d24dec4d2e8fc0d4e74f49521c214b0535f395ab76371f11ad6af5b20c0006aabea95b7522aac5ae954
-
Filesize
7KB
MD5f43b686e39e2e4fa77c3f6201959910d
SHA1a6db532e3ae96cccc3077382f71cc8f2b5d0ac00
SHA256878a251f6fc81ccd01fc3aa851ba548847f88d89ae5628961eb73202ad46125f
SHA5127c5334a4d85cdec0ea03fe7acbb0207a5b4a273072c348922d4c89ed48d8b38501384bc8924f295b07b215dc35b7e3f0cecbc5dc6bfd203c75aed96d75353fb2
-
Filesize
188KB
MD504949b92785b6f8fe9624341c442391a
SHA11f055b994981db7827d0e6322f594041a6cf92a8
SHA2566db0365cbc8528e8ce6b9a7b4b88a23b589db42b72621deb6beddbde2318f332
SHA512b01326d7779252d80dc4e16a1acaee9bc0e87dd7dd9ba9adfa44629267f8e191a179793e964bf9da99d64130941992668d9e8c1c2c7ce293b93a8a2efc6c372c
-
Filesize
188KB
MD50974dc658935c03962ab6a929763cf3b
SHA173e6d5b079744464ddd96ebf34a234df759f353e
SHA256d5810c54b420c7ceb68624802f3529c615f890a021d523dd1467d7212d92641d
SHA512e9f383a057d5fe47f6ef6942f31926e610781f807f72a4b8ddbf4a1dfc9ca5e6990b74d83761291002d709e381b6ca9dda2d45e870e59aa9c7ae31fbfc5fd7e8
-
Filesize
188KB
MD5c1b42e531cd6cb72d9b6caf50af8a275
SHA193607afaeb4d1357f07e05ac37bf50f23b3aac29
SHA2561f7d832bb9eb5a5447c52a0ed30fff49f373b04690c235e3cca165e66072487f
SHA5121315c2e0a860400bb137414233036962f45fb08d289ca5cba0f20ce02049ecf21c29172130f7e908f86c796c5bd083e21e6a5a2a451ba5d88e43c91e91c826c5
-
Filesize
188KB
MD535dc9bd498599ac59ec6e7f3f21d36f1
SHA1ddd385e3c92a4026575d4ae165c97fe79f9a6250
SHA25671c1ce6bf520d7545b4f8487c65703b480ad74a9d6232d96f7892a752b042403
SHA5120bffb718724249a6c6e08a9145bd208a15b97f72eabf80ae96dab5fede655d278d21cb0acfc43af4b21d76fad72898cc493fd350b53971b1ea1aad2e491f7b24