Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
17/05/2021, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe
Resource
win10v20210408
General
-
Target
7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe
-
Size
602KB
-
MD5
0caddb2ff4cf3915676a0f1119cc5048
-
SHA1
571570f454c118970800ab24e629766e3c7f9259
-
SHA256
7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69
-
SHA512
757ed6bcdc4a4240b7d83b2d603132d4bd6aed4a9a3eb93b2a2fd474393d158c89e1378010b12de1c9b84e6537301318e21c17d0f15422260baaf14b1eae49c8
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 1052 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1840 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe 1840 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1052 1840 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe 29 PID 1840 wrote to memory of 1052 1840 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe 29 PID 1840 wrote to memory of 1052 1840 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe 29 PID 1840 wrote to memory of 1052 1840 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe"C:\Users\Admin\AppData\Local\Temp\7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:1052
-