Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/03/2025, 18:58 UTC

250301-xmhhrayp15 10

01/03/2025, 18:55 UTC

250301-xkqrcaypx7 10

Analysis

  • max time kernel
    900s
  • max time network
    839s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2025, 19:41 UTC

General

  • Target

    2c01b007729230c415420ad641ad92eb.exe

  • Size

    1.3MB

  • MD5

    daef338f9c47d5394b7e1e60ce38d02d

  • SHA1

    c0a07e8c32528d29aae26aaecbf6a67ed95b8c8e

  • SHA256

    5d03fd083b626a5516194d5e94576349100c9c98ca7d6845642ed9579980ca58

  • SHA512

    d0f4050fc2c5f38ab598729fb6930c84bf779d47b5a8b4e860bc0e9ca8be454ad5dce001d8f88299d8a079eafd4c26efcdd2d196352acfe45e940cc107fcebf4

  • SSDEEP

    24576:W85y6Jwdt8jtWoJpXWHALGX+C1Co3aP8jvuC7g6zwm4m53Sb21SR:HXsSGuC/MIvuC5kFm53Sy1SR

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Detected Nirsoft tools 13 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 9 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 9 IoCs

    Password recovery tool for various web browsers

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c01b007729230c415420ad641ad92eb.exe
    "C:\Users\Admin\AppData\Local\Temp\2c01b007729230c415420ad641ad92eb.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\AppData\Roaming\wou\odm.exe
      "C:\Users\Admin\AppData\Roaming\wou\odm.exe" kja-pex
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Users\Admin\AppData\Roaming\wou\odm.exe
        C:\Users\Admin\AppData\Roaming\wou\odm.exe C:\Users\Admin\AppData\Roaming\wou\DXZGK
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1088
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
            5⤵
            • Accesses Microsoft Outlook accounts
            • System Location Discovery: System Language Discovery
            PID:2492
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1008
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          C:\Users\Admin\AppData\Roaming\wou\DXZGK
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1436
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2936

Network

  • flag-us
    DNS
    whatismyipaddress.com
    RegSvcs.exe
    Remote address:
    8.8.8.8:53
    Request
    whatismyipaddress.com
    IN A
    Response
    whatismyipaddress.com
    IN A
    104.19.222.79
    whatismyipaddress.com
    IN A
    104.19.223.79
  • flag-us
    GET
    http://whatismyipaddress.com/
    RegSvcs.exe
    Remote address:
    104.19.222.79:80
    Request
    GET / HTTP/1.1
    Host: whatismyipaddress.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 403 Forbidden
    Date: Thu, 13 Feb 2025 20:05:43 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    Referrer-Policy: same-origin
    Cache-Control: max-age=15
    Expires: Thu, 13 Feb 2025 20:05:58 GMT
    X-Frame-Options: SAMEORIGIN
    Server: cloudflare
    CF-RAY: 91176f557b51947e-LHR
    alt-svc: h3=":443"; ma=86400
  • flag-us
    DNS
    mail.jakartaalatkantor.com
    RegSvcs.exe
    Remote address:
    8.8.8.8:53
    Request
    mail.jakartaalatkantor.com
    IN A
    Response
  • 104.19.222.79:80
    http://whatismyipaddress.com/
    http
    RegSvcs.exe
    537 B
    5.3kB
    10
    10

    HTTP Request

    GET http://whatismyipaddress.com/

    HTTP Response

    403
  • 8.8.8.8:53
    whatismyipaddress.com
    dns
    RegSvcs.exe
    67 B
    99 B
    1
    1

    DNS Request

    whatismyipaddress.com

    DNS Response

    104.19.222.79
    104.19.223.79

  • 8.8.8.8:53
    mail.jakartaalatkantor.com
    dns
    RegSvcs.exe
    72 B
    145 B
    1
    1

    DNS Request

    mail.jakartaalatkantor.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\wou\DXZGK

    Filesize

    91KB

    MD5

    9375872d82fbfe00eb4f6e608aa170d8

    SHA1

    b6d6f7059c025075141293cc0c1f80c1063ef75b

    SHA256

    a1b44347af8b2b2bf0409bb96e99f012035dc494ef44db409dbcd2bb726ff2e9

    SHA512

    f05e7f8c5d4edc6c41c0a2e4c63492a8578a4ae44e093396214fe422b90bd6e6d5fc98e1d8c4ee2253845a8b1a0bf202cd27450f641a8261d7f660b26162b863

  • C:\Users\Admin\AppData\Roaming\wou\ait.ico

    Filesize

    1KB

    MD5

    f6efac00916f3425d6079ae5a956df11

    SHA1

    3153abfe46186c1186882f67444c82c544615fb7

    SHA256

    1e866a8f06f125fa1c439f9cb00199be827e74b87eae12368bd1e2cf7ab28728

    SHA512

    0ba766d5816057941ad9afc80f7b20620b0120411357fe2b97ab0a425b32d4309396ed4866c8b23c92893ed68971c4a8a8c6f25ffa411ba0c70b602a63bd4743

  • C:\Users\Admin\AppData\Roaming\wou\rid.ico

    Filesize

    1.2MB

    MD5

    a5f2dcee6a2a6047aa8fdde1ae2ce290

    SHA1

    7a082661c9a3431cd89ed4d9959178d60b9570f7

    SHA256

    7da78e767ff859970c8dae593b62f1366c2c651500eb280f0077a2245a9a8625

    SHA512

    e001300fc56f9bc8e9d61cb904ea6dec5ca447729015c9ff3dccc021f319fcce57ebaabb196a56f80d249dfbb88b4a0a273858cf14c7b9a93c10c9c8bc243d0a

  • C:\Users\Admin\AppData\Roaming\wou\spd

    Filesize

    4B

    MD5

    098f6bcd4621d373cade4e832627b4f6

    SHA1

    a94a8fe5ccb19ba61c4c0873d391e987982fbbd3

    SHA256

    9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08

    SHA512

    ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff

  • C:\Users\Admin\AppData\Roaming\wou\zbackup- Copy.png

    Filesize

    16KB

    MD5

    6285049d1e4f854943856164652da8d8

    SHA1

    f29c791ddb940be594bfb431eca7d4cb6d9e2688

    SHA256

    0aeb7e8a131b53991567db463519ea005d41ddd1f227a744d4f7066805ce684f

    SHA512

    2bb954a07f82c19b26d745ac19cd66e6eb82c525db0bd6e9e6880b0077465897d7fc49521d40361262c9dccdba4de6cead5b7d8dc09a9beaae2d668537097291

  • \Users\Admin\AppData\Roaming\wou\odm.exe

    Filesize

    732KB

    MD5

    71d8f6d5dc35517275bc38ebcc815f9f

    SHA1

    cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

    SHA256

    fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

    SHA512

    4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

  • memory/740-74-0x0000000001E10000-0x0000000001E12000-memory.dmp

    Filesize

    8KB

  • memory/1008-135-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1008-129-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1008-127-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1008-126-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/1152-102-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1152-107-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1152-108-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1152-100-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1152-104-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1152-109-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1152-106-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1152-98-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1436-119-0x0000000000330000-0x00000000003FC000-memory.dmp

    Filesize

    816KB

  • memory/1436-114-0x0000000000330000-0x00000000003FC000-memory.dmp

    Filesize

    816KB

  • memory/1436-117-0x0000000000330000-0x00000000003FC000-memory.dmp

    Filesize

    816KB

  • memory/1436-112-0x0000000000330000-0x00000000003FC000-memory.dmp

    Filesize

    816KB

  • memory/2492-124-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2492-122-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2492-125-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2492-121-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2936-75-0x0000000000140000-0x0000000000142000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.