Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
40s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15/05/2021, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe
Resource
win10v20210408
General
-
Target
ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe
-
Size
35KB
-
MD5
ba3216a8a6fdb33b0c5168d1e9892bc3
-
SHA1
360c50f82bac1875942d3660f50afd04b2e88903
-
SHA256
ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0
-
SHA512
4e1ff3996910508bd3736f6e2e34bee689459fa0c7e921f9d631d3375a915630ea0a49971a4c6d16a068f61f785362b6b3b851e6e82fb468d471ff8487f05041
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 360 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1120 ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe 1120 ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 360 1120 ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe 29 PID 1120 wrote to memory of 360 1120 ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe 29 PID 1120 wrote to memory of 360 1120 ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe 29 PID 1120 wrote to memory of 360 1120 ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe"C:\Users\Admin\AppData\Local\Temp\ba1775b7efc29ea7105e2aeaca058ac5bd60c5f92e4ae43e4edf4d4892d3e0d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:360
-