Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe
Resource
win10v2004-20241007-en
General
-
Target
856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe
-
Size
37KB
-
MD5
47dcb0f1b08280a3a86de547be9e61a0
-
SHA1
91fc0d6001de4442200fd844d97ad1742ef8ab5c
-
SHA256
856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7e
-
SHA512
767c1e78d1c2670a35cdd2b0389bd0971af22b62d01b8c29c99114815da5e595f5938ee6333f401bc820bfdbb50907916d37e575baf9a83a14afc9a13cb56e41
-
SSDEEP
768:sIUomGz54SKEv7DltPkvgpREnOZGwXNiOA9uce7ezbB2ZLo5f1zRHf7CLQw53AIY:saKvEbPkvgAZCNQQceUl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "24064" oukgoavax-eanac.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53504445-424a-5748-5350-4445424A5748}\IsInstalled = "1" oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53504445-424a-5748-5350-4445424A5748}\StubPath = "C:\\Windows\\system32\\igsoarir.exe" oukgoavax-eanac.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53504445-424a-5748-5350-4445424A5748} oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53504445-424a-5748-5350-4445424A5748}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" oukgoavax-eanac.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\easmeaboah-oxoas.exe" oukgoavax-eanac.exe -
Executes dropped EXE 2 IoCs
pid Process 4872 oukgoavax-eanac.exe 1768 oukgoavax-eanac.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "24064" oukgoavax-eanac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "24064" oukgoavax-eanac.exe -
description ioc Process Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger oukgoavax-eanac.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\omdoanoom.dll" oukgoavax-eanac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" oukgoavax-eanac.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} oukgoavax-eanac.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RECOVER32.DLL oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\oukgoavax-eanac.exe 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe File created C:\Windows\SysWOW64\easmeaboah-oxoas.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\igsoarir.exe oukgoavax-eanac.exe File created C:\Windows\SysWOW64\igsoarir.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\winrnt.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\ahuy.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\idbg32.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\easmeaboah-oxoas.exe oukgoavax-eanac.exe File created C:\Windows\SysWOW64\omdoanoom.dll oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\rmass.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\aset32.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\ntdbg.exe oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\gymspzd.dll oukgoavax-eanac.exe File opened for modification C:\Windows\SysWOW64\oukgoavax-eanac.exe oukgoavax-eanac.exe File created C:\Windows\SysWOW64\oukgoavax-eanac.exe 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe File opened for modification C:\Windows\SysWOW64\omdoanoom.dll oukgoavax-eanac.exe -
resource yara_rule behavioral2/memory/4872-4-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/files/0x000a000000023c08-5.dat upx behavioral2/memory/4872-39-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1768-44-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System\ntdbg.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\RECOVER32.DLL oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\gymspzd.dll oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\winrnt.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\rmass.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\aset32.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\ahuy.exe oukgoavax-eanac.exe File opened for modification C:\Program Files (x86)\Common Files\System\idbg32.exe oukgoavax-eanac.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oukgoavax-eanac.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 1768 oukgoavax-eanac.exe 1768 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe 4872 oukgoavax-eanac.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4872 oukgoavax-eanac.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4872 4644 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 82 PID 4644 wrote to memory of 4872 4644 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 82 PID 4644 wrote to memory of 4872 4644 856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe 82 PID 4872 wrote to memory of 612 4872 oukgoavax-eanac.exe 5 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 1768 4872 oukgoavax-eanac.exe 83 PID 4872 wrote to memory of 1768 4872 oukgoavax-eanac.exe 83 PID 4872 wrote to memory of 1768 4872 oukgoavax-eanac.exe 83 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56 PID 4872 wrote to memory of 3448 4872 oukgoavax-eanac.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe"C:\Users\Admin\AppData\Local\Temp\856c3df7946ae567388eb3ed1612e4b2e17003ce6d140515f3f0ae7f554b4c7eN.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\oukgoavax-eanac.exe"C:\Windows\SysWOW64\oukgoavax-eanac.exe"3⤵
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Windows security modification
- Indicator Removal: Clear Persistence
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\oukgoavax-eanac.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5066d7ae3f9fe7951b18cd261cd1118a9
SHA15ab55a0f6a4483c5cdf52afd9877625758f1e08a
SHA256515b77bed5a03bed1553b103765af03fcca295728919cc0658af73b56dbb2023
SHA512d55f5b8ab11cd40c4e850d8d31d9c3f82236aa368896ca6682df284b18f65d0caf7c71febf2451be29cd64d400d39bc7b16f552e045ca76557f377f231e693d9
-
Filesize
37KB
MD59760c9d851cfd9756bca6a6008ac6ae2
SHA15ec9d417546f9e72e3fb3cf716e6cd5266d04ae6
SHA25650460e8a9ac6615e855968e341df7c16c00ac70a6a6e2c6302b05a96ea62be4f
SHA5121a3af60a669aea8a5af847a5453a2bff7a029e75ec723d064acd25ccc50a5324eed8b187e1032e9f3fbd05fdfdc32b6935ffafb4adda6778221dcb9475a756d3
-
Filesize
5KB
MD5c8521a5fdd1c9387d536f599d850b195
SHA1a543080665107b7e32bcc1ed19dbfbc1d2931356
SHA256fa8f77b6daf775d66de9d27c1d896168a792057358e518c00e72b8964b966ca5
SHA512541500e2cd502852a007d29badc1a1848d187245f78ec272281bab290cc6e308f0ae6d1b96863e0c30a176b16c6cf7e63e08a8de81a84615e4710e7164a805cd
-
Filesize
35KB
MD56f1dc9dab8d0b1a50722ad2b06e8c709
SHA13ecf189ba842f00048b25fed9168f2e65b33c15e
SHA2569e91d4c1993fd5f26eefb6cb7420e6cc01b4f4e0427fe560047853e03abf516c
SHA51229bf5ee93add72e69c888d0fac8c500d257f88b6d8b088de539b104251230cbd90bf0582a43d5ac6b4486a958e2bf143040d3abb863e69e3dae1a0f10de4b4c8