Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
hycd080401.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
hycd080401.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
hycd080401.exe
-
Size
11.7MB
-
MD5
0e18b0a71b48c4aed2de96cd9617ca54
-
SHA1
104b574dd31d41f7b0f5d8fa55b573c62702a5d1
-
SHA256
b39a1f7d4b6bf15780788d10615a39839b5ab460a873cf4d3c0976ce3ffa4474
-
SHA512
fa87b25f7d071c0b3f760b19fc2fce921883f74ed18ab3af0a4723ccc724373a357cdba9539e03a790b135549a8519deb884f90cdad807f62e6415cf69e0d769
-
SSDEEP
196608:xoiCnmup1ZigSn+YB+QRnzfdvwYeGZv9q67gFyDlkSy0SQjiG84Y2DtKEpKBhTjF:qiPupntSnHzf9ZFVhlLeHr2DaPTj8Cyi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 is-HCU49.tmp -
Loads dropped DLL 3 IoCs
pid Process 2368 hycd080401.exe 1680 is-HCU49.tmp 1680 is-HCU49.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hycd080401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-HCU49.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1680 is-HCU49.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1680 2368 hycd080401.exe 30 PID 2368 wrote to memory of 1680 2368 hycd080401.exe 30 PID 2368 wrote to memory of 1680 2368 hycd080401.exe 30 PID 2368 wrote to memory of 1680 2368 hycd080401.exe 30 PID 2368 wrote to memory of 1680 2368 hycd080401.exe 30 PID 2368 wrote to memory of 1680 2368 hycd080401.exe 30 PID 2368 wrote to memory of 1680 2368 hycd080401.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\hycd080401.exe"C:\Users\Admin\AppData\Local\Temp\hycd080401.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\is-7OJU5.tmp\is-HCU49.tmp"C:\Users\Admin\AppData\Local\Temp\is-7OJU5.tmp\is-HCU49.tmp" /SL4 $C0150 "C:\Users\Admin\AppData\Local\Temp\hycd080401.exe" 12063197 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
656KB
MD51cf8ec393a12c669da89314edbf7fb13
SHA145412ee63b25bab2a038d521189f56b6a8f3084b
SHA25612408b26affb5b03e25a9a8e9c66097e2112185c82f0b8042eab96eb450d360d
SHA5124f520c479b9ccd7260b0b4df409db8378ec50df475048450827bd69c1fc97ead2a1c646cf8d1f46c6754b904eae2b0c69852d84973ff0c47b3c34f8b704b439d