Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 08:19
Behavioral task
behavioral1
Sample
808c54e52e59237255aff6d34511a760N.exe
Resource
win7-20240708-en
General
-
Target
808c54e52e59237255aff6d34511a760N.exe
-
Size
558KB
-
MD5
808c54e52e59237255aff6d34511a760
-
SHA1
b3676f18e81917f753e202e483c0b9fb8533d2ec
-
SHA256
bd6338278e91a2f1c3ee4857c69899640d897a120ae9764759fc9ad2c8b9b78d
-
SHA512
da396174fb2ddeb2d6b04120cb5f34d09acb75a056a048a387f6e718ff98edf9f060567b219123aef4518a5baedf9d3e6fdc8a7afe8ffbeefb9d6f934e3749e0
-
SSDEEP
12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEy9:znPfQp9L3olqF9
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
pid Process 2464 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2280 herix.exe 1048 qysyi.exe -
Loads dropped DLL 2 IoCs
pid Process 2076 808c54e52e59237255aff6d34511a760N.exe 2280 herix.exe -
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/files/0x0009000000015e25-4.dat upx behavioral1/memory/2280-17-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2076-18-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2280-21-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2280-28-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 808c54e52e59237255aff6d34511a760N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language herix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qysyi.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe 1048 qysyi.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2280 2076 808c54e52e59237255aff6d34511a760N.exe 30 PID 2076 wrote to memory of 2280 2076 808c54e52e59237255aff6d34511a760N.exe 30 PID 2076 wrote to memory of 2280 2076 808c54e52e59237255aff6d34511a760N.exe 30 PID 2076 wrote to memory of 2280 2076 808c54e52e59237255aff6d34511a760N.exe 30 PID 2076 wrote to memory of 2464 2076 808c54e52e59237255aff6d34511a760N.exe 31 PID 2076 wrote to memory of 2464 2076 808c54e52e59237255aff6d34511a760N.exe 31 PID 2076 wrote to memory of 2464 2076 808c54e52e59237255aff6d34511a760N.exe 31 PID 2076 wrote to memory of 2464 2076 808c54e52e59237255aff6d34511a760N.exe 31 PID 2280 wrote to memory of 1048 2280 herix.exe 34 PID 2280 wrote to memory of 1048 2280 herix.exe 34 PID 2280 wrote to memory of 1048 2280 herix.exe 34 PID 2280 wrote to memory of 1048 2280 herix.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\808c54e52e59237255aff6d34511a760N.exe"C:\Users\Admin\AppData\Local\Temp\808c54e52e59237255aff6d34511a760N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\herix.exe"C:\Users\Admin\AppData\Local\Temp\herix.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\qysyi.exe"C:\Users\Admin\AppData\Local\Temp\qysyi.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5b04098617867c9bef45e960e20db46be
SHA160c9312e22d0d96a506eb0b5dde890bc7118f04a
SHA25699c9f776d3efb8b852b3c6648bbb53dc6e0b5d40d0fb81630d24f893cef57a81
SHA512342737c82e83b704a4319fc08b77eb4b91061e14da674a6ed16d46d8164841161bf40dd83820210dc10209ae0ce6d98e3712874f8af434e452c58d39bc19d9c1
-
Filesize
512B
MD593ad622e3c8281d2cd15678d95385357
SHA1ad629324e78aa1f267721b0514fbad36bd81071c
SHA256daf4b7ee404caf409f06ef55ea3dae0bb1be3b3ba08a3e5fda9b24478254a9ae
SHA5126b437bb3c3876ebb93b7e0cd51f7d253bc2271bc5ab95122bd10187252c4cb947775184e628ddfd9948640c0c61e4cec2f26b832c186f096bf9d03e44e90707b
-
Filesize
558KB
MD5799161409952a7edfce338875f96fa3f
SHA19c6f6933e06e3a97e6301fe17fa9f85434e3bfdc
SHA25659ceac4f257288c9859f0e22834c892fc87204740149e295bb64a4beaf996dbe
SHA5125261374e7b7391dfb6f9cde1c001e7c22d3b1ccac67e7a182aa3b0275b923dad287fbd7227b98742ffa45f8c4964d0d826622c51e24c285ef402ad10f0bc6a10
-
Filesize
194KB
MD556056d70240329c4d50afd3b093ad0c5
SHA1335f1a427cb6cc98a83afc74e6f7b4884a39946c
SHA25695436c0daa86e28558980428e5a4b5d288c4b235ed64867756ed392d76b53279
SHA512cd7cf23d27b800f50fe3656b9c74e7af8e2de083f409d2cf42fdeea35e9296aebf70d6b46d01303ed475b7e7c9a99f92a8010a15ea2e946ea7023116ecde17fb