Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 18:06

General

  • Target

    e898eca29a80a90dc080efda283ad1c0N.exe

  • Size

    188KB

  • MD5

    e898eca29a80a90dc080efda283ad1c0

  • SHA1

    3bc8b6da66d60a40c13eb763d40ebc7b797048fa

  • SHA256

    490abdd38ede660b5d7bf832f887884840f007b41e1682de86141b5acc01bbf7

  • SHA512

    e014325be53d5fa534ee3fa6d17bc722d05161793c672a0c16564023e60083a2a10f4e63d85d0457da9eca284f0f10b07168158d305c839b72f2b53d531a46f5

  • SSDEEP

    3072:TbHdyUQ9Do5J+FJCk1AerDtsr3vhqhEN4MAH+mbPepZBC8qzNJSKrDco:l5Q9D6+FJCk1AelhEN4MujGJoSoDco

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 14 IoCs
  • Drops file in System32 directory 21 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e898eca29a80a90dc080efda283ad1c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e898eca29a80a90dc080efda283ad1c0N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Windows\SysWOW64\Bbikig32.exe
      C:\Windows\system32\Bbikig32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\Bopknhjd.exe
        C:\Windows\system32\Bopknhjd.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2132
        • C:\Windows\SysWOW64\Cobhdhha.exe
          C:\Windows\system32\Cobhdhha.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Windows\SysWOW64\Ckiiiine.exe
            C:\Windows\system32\Ckiiiine.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2068
            • C:\Windows\SysWOW64\Clhecl32.exe
              C:\Windows\system32\Clhecl32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2644
              • C:\Windows\SysWOW64\Cdcjgnbc.exe
                C:\Windows\system32\Cdcjgnbc.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2636
                • C:\Windows\SysWOW64\Coindgbi.exe
                  C:\Windows\system32\Coindgbi.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Bbikig32.exe

    Filesize

    188KB

    MD5

    e2ebeff5f076e7fa7bb68552b08c1d82

    SHA1

    cea59b4e25db7dd112e3488dfe8b8ea02fa178e8

    SHA256

    357a270169a59eb2e45220df0f5ed9be16ab20b95f485652f6c7a8cb0ce5be33

    SHA512

    cac12fbc93fff427b02f3bd62e01ac986bafba6feafe8ad068fbf7e8510660831833b670e0489754c367c440c9bddd3e603d556c145f784fd7812e06ab3e369e

  • C:\Windows\SysWOW64\Clhecl32.exe

    Filesize

    188KB

    MD5

    611de04df2f01e194ee84921d7d54f22

    SHA1

    9446e6a65257c6fee63bb9d955fd73191504f537

    SHA256

    f7668270c7df6c067368e75153cc32b1552086d74910e7fdcb27e9125deda584

    SHA512

    0439639636891be5173a8e9c0de72fd187f40d0e51651503c5b9a297780bb47144492ae1a9cff5dcd2bcd04343e3b50730e260f79b46c16d37e59cf4283226bd

  • C:\Windows\SysWOW64\Cobhdhha.exe

    Filesize

    188KB

    MD5

    55027d8f2908da26e4a8c938ddc520ef

    SHA1

    1141ca60b5f2432b6444c3ca7cb5f523b007da15

    SHA256

    64bdc9a84939e87573307742652b121021789ddb503c8d3cdcb2889d4721091c

    SHA512

    b779d5856f9a50e1053c6c86bd59b7e992d56aef16f87d24dec4d2e8fc0d4e74f49521c214b0535f395ab76371f11ad6af5b20c0006aabea95b7522aac5ae954

  • C:\Windows\SysWOW64\Lfehem32.dll

    Filesize

    7KB

    MD5

    f43b686e39e2e4fa77c3f6201959910d

    SHA1

    a6db532e3ae96cccc3077382f71cc8f2b5d0ac00

    SHA256

    878a251f6fc81ccd01fc3aa851ba548847f88d89ae5628961eb73202ad46125f

    SHA512

    7c5334a4d85cdec0ea03fe7acbb0207a5b4a273072c348922d4c89ed48d8b38501384bc8924f295b07b215dc35b7e3f0cecbc5dc6bfd203c75aed96d75353fb2

  • \Windows\SysWOW64\Bopknhjd.exe

    Filesize

    188KB

    MD5

    04949b92785b6f8fe9624341c442391a

    SHA1

    1f055b994981db7827d0e6322f594041a6cf92a8

    SHA256

    6db0365cbc8528e8ce6b9a7b4b88a23b589db42b72621deb6beddbde2318f332

    SHA512

    b01326d7779252d80dc4e16a1acaee9bc0e87dd7dd9ba9adfa44629267f8e191a179793e964bf9da99d64130941992668d9e8c1c2c7ce293b93a8a2efc6c372c

  • \Windows\SysWOW64\Cdcjgnbc.exe

    Filesize

    188KB

    MD5

    0974dc658935c03962ab6a929763cf3b

    SHA1

    73e6d5b079744464ddd96ebf34a234df759f353e

    SHA256

    d5810c54b420c7ceb68624802f3529c615f890a021d523dd1467d7212d92641d

    SHA512

    e9f383a057d5fe47f6ef6942f31926e610781f807f72a4b8ddbf4a1dfc9ca5e6990b74d83761291002d709e381b6ca9dda2d45e870e59aa9c7ae31fbfc5fd7e8

  • \Windows\SysWOW64\Ckiiiine.exe

    Filesize

    188KB

    MD5

    c1b42e531cd6cb72d9b6caf50af8a275

    SHA1

    93607afaeb4d1357f07e05ac37bf50f23b3aac29

    SHA256

    1f7d832bb9eb5a5447c52a0ed30fff49f373b04690c235e3cca165e66072487f

    SHA512

    1315c2e0a860400bb137414233036962f45fb08d289ca5cba0f20ce02049ecf21c29172130f7e908f86c796c5bd083e21e6a5a2a451ba5d88e43c91e91c826c5

  • \Windows\SysWOW64\Coindgbi.exe

    Filesize

    188KB

    MD5

    35dc9bd498599ac59ec6e7f3f21d36f1

    SHA1

    ddd385e3c92a4026575d4ae165c97fe79f9a6250

    SHA256

    71c1ce6bf520d7545b4f8487c65703b480ad74a9d6232d96f7892a752b042403

    SHA512

    0bffb718724249a6c6e08a9145bd208a15b97f72eabf80ae96dab5fede655d278d21cb0acfc43af4b21d76fad72898cc493fd350b53971b1ea1aad2e491f7b24

  • memory/804-12-0x0000000000280000-0x00000000002B4000-memory.dmp

    Filesize

    208KB

  • memory/804-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/804-98-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2068-102-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2068-55-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2068-68-0x0000000000440000-0x0000000000474000-memory.dmp

    Filesize

    208KB

  • memory/2132-40-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/2132-100-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2140-97-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2140-105-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2564-99-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2564-13-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2564-26-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/2564-25-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/2636-104-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2636-83-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2636-96-0x00000000002D0000-0x0000000000304000-memory.dmp

    Filesize

    208KB

  • memory/2644-103-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2644-81-0x0000000000310000-0x0000000000344000-memory.dmp

    Filesize

    208KB

  • memory/2644-69-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2912-41-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2912-101-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2912-54-0x0000000000270000-0x00000000002A4000-memory.dmp

    Filesize

    208KB