Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30/11/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe
Resource
win10v2004-20241007-en
General
-
Target
856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe
-
Size
37KB
-
MD5
47dcb0f1b08280a3a86de547be9e61a0
-
SHA1
91fc0d6001de4442200fd844d97ad1742ef8ab5c
-
SHA256
856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7e
-
SHA512
767c1e78d1c2670a35cdd2b0389bd0971af22b62d01b8c29c99114815da5e595f5938ee6333f401bc820bfdbb50907916d37e575baf9a83a14afc9a13cb56e41
-
SSDEEP
768:sIUomGz54SKEv7DltPkvgpREnOZGwXNiOA9uce7ezbB2ZLo5f1zRHf7CLQw53AIY:saKvEbPkvgAZCNQQceUl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "24064" oukgoavax-eanac.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{504A4353-444d-5250-504A-4353444D5250} oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{504A4353-444d-5250-504A-4353444D5250}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{504A4353-444d-5250-504A-4353444D5250}\IsInstalled = "1" oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{504A4353-444d-5250-504A-4353444D5250}\StubPath = "C:\\Windows\\system32\\igsoarir.exe" oukgoavax-eanac.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\easmeaboah-oxoas.exe" oukgoavax-eanac.exe -
Executes dropped EXE 2 IoCs
pid Process 2608 oukgoavax-eanac.exe 2004 oukgoavax-eanac.exe -
Loads dropped DLL 3 IoCs
pid Process 2604 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 2604 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 2608 oukgoavax-eanac.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "24064" oukgoavax-eanac.exe -
description ioc Process Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger oukgoavax-eanac.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\omdoanoom.dll" oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" oukgoavax-eanac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} oukgoavax-eanac.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File created C:\Windows\SysWOW64\oukgoavax-eanac.exe 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe File opened for modification C:\Windows\SysWOW64\easmeaboah-oxoas.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\omdoanoom.dll oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\rmass.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\ntdbg.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\oukgoavax-eanac.exe 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe File opened for modification C:\Windows\SysWOW64\winrnt.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\aset32.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\RECOVER32.DLL oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\igsoarir.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\idbg32.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\ahuy.exe oukgoavax-eanac.exe File created C:\Windows\SysWOW64\igsoarir.exe oukgoavax-eanac.exe File created C:\Windows\SysWOW64\omdoanoom.dll oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\gymspzd.dll oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\oukgoavax-eanac.exe oukgoavax-eanac.exe File created C:\Windows\SysWOW64\easmeaboah-oxoas.exe oukgoavax-eanac.exe -
resource yara_rule behavioral1/files/0x000d00000001202b-6.dat upx behavioral1/memory/2608-10-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/2004-23-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/2608-45-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/2004-53-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System\idbg32.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\ntdbg.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\RECOVER32.DLL oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\gymspzd.dll oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\winrnt.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\rmass.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\aset32.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\ahuy.exe oukgoavax-eanac.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oukgoavax-eanac.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2004 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe 2608 oukgoavax-eanac.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2608 oukgoavax-eanac.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2608 2604 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 30 PID 2604 wrote to memory of 2608 2604 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 30 PID 2604 wrote to memory of 2608 2604 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 30 PID 2604 wrote to memory of 2608 2604 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 30 PID 2608 wrote to memory of 428 2608 oukgoavax-eanac.exe 5 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 2004 2608 oukgoavax-eanac.exe 31 PID 2608 wrote to memory of 2004 2608 oukgoavax-eanac.exe 31 PID 2608 wrote to memory of 2004 2608 oukgoavax-eanac.exe 31 PID 2608 wrote to memory of 2004 2608 oukgoavax-eanac.exe 31 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21 PID 2608 wrote to memory of 1208 2608 oukgoavax-eanac.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe"C:\Users\Admin\AppData\Local\Temp\856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\oukgoavax-eanac.exe"C:\Windows\SysWOW64\oukgoavax-eanac.exe"3⤵
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Indicator Removal: Clear Persistence
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\oukgoavax-eanac.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD50d67c89d81fc385ec6fcadc72c6a9896
SHA1e518825f9bd0c76f8a9f4b7718cf818177c4c511
SHA2569e2bb1d02e2104a0fc33b564f6cd103326806ea08b49d1d431f1103a7afb2696
SHA51295e695ea0dfa441ef80f124e5b2abbe28f6a9470f6fcdf43b5fcf85ee851e1a6839260abfb067b3ca845b63b3c0e228b9ff7da2e792cbc2df4b2d940b5d9e022
-
Filesize
37KB
MD52a548c6d967318880ae061b46a14dff8
SHA19f6fb81825675fb13bdfbfc1236c4d516f9222c3
SHA256196ca8046bfe869d54d83a7f4c6e4f801738c6450a40db25582c6f9b34987d94
SHA5124f9a57fd0a38e4561147fd034d526fa0c40df07fddd2ef40f9fb414888bbe7c118937279c54e3b4545b91d904a360fa1440e227d23f6688257d00cbf375ff8bb
-
Filesize
5KB
MD5c8521a5fdd1c9387d536f599d850b195
SHA1a543080665107b7e32bcc1ed19dbfbc1d2931356
SHA256fa8f77b6daf775d66de9d27c1d896168a792057358e518c00e72b8964b966ca5
SHA512541500e2cd502852a007d29badc1a1848d187245f78ec272281bab290cc6e308f0ae6d1b96863e0c30a176b16c6cf7e63e08a8de81a84615e4710e7164a805cd
-
Filesize
35KB
MD56f1dc9dab8d0b1a50722ad2b06e8c709
SHA13ecf189ba842f00048b25fed9168f2e65b33c15e
SHA2569e91d4c1993fd5f26eefb6cb7420e6cc01b4f4e0427fe560047853e03abf516c
SHA51229bf5ee93add72e69c888d0fac8c500d257f88b6d8b088de539b104251230cbd90bf0582a43d5ac6b4486a958e2bf143040d3abb863e69e3dae1a0f10de4b4c8