Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

07/09/2021, 17:26

210907-vzzaxsdae6 10

07/09/2021, 13:18

210907-qkaa2acfe3 10

06/09/2021, 17:52

210906-wfz9jsbch4 10

06/09/2021, 17:51

210906-wfnwhsbch3 10

06/09/2021, 13:27

210906-qp3hdaedaj 10

06/09/2021, 09:28

210906-lfpgyaeael 10

06/09/2021, 04:33

210906-e6mmpsaaa2 10

05/09/2021, 05:25

210905-f4h26sfab6 10

04/09/2021, 21:32

210904-1dqdsahfdj 10

04/09/2021, 21:19

210904-z56z6shfck 10

Analysis

  • max time kernel
    28s
  • max time network
    434s
  • platform
    windows10_x64
  • resource
    win10-fr
  • submitted
    06/09/2021, 17:52

General

  • Target

    setup_x86_x64_install.exe

  • Size

    2.2MB

  • MD5

    e3b3a95ef03de0de77cca7a54ea22c94

  • SHA1

    d318d234f8f27f25de660d9881113df9d11c24ff

  • SHA256

    baa381f572d293636b6e48cacd2cd6a6f4f9e5f71c583873260f6ac01f0f5e15

  • SHA512

    3c1c6254f14491bc2cb096d8b46d0d65e096dac331bab2df9c5b173271eef1b9a9deb831f212a0117fab16665277208d0c1b5183ea600cc2bbe6f9049c57ad0d

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 7 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\7zS0CA85B04\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS0CA85B04\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3336
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            5⤵
              PID:4256
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Fri1544861ac3fe6a.exe
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3172
            • C:\Users\Admin\AppData\Local\Temp\7zS0CA85B04\Fri1544861ac3fe6a.exe
              Fri1544861ac3fe6a.exe
              5⤵
              • Executes dropped EXE
              PID:4164
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Fri156ec98815f89c.exe
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1884
            • C:\Users\Admin\AppData\Local\Temp\7zS0CA85B04\Fri156ec98815f89c.exe
              Fri156ec98815f89c.exe
              5⤵
              • Executes dropped EXE
              PID:4296
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Fri155442fc38b.exe
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1328
            • C:\Users\Admin\AppData\Local\Temp\7zS0CA85B04\Fri155442fc38b.exe
              Fri155442fc38b.exe
              5⤵
              • Executes dropped EXE
              PID:4212
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Fri1553f0ee90.exe
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4156
            • C:\Users\Admin\AppData\Local\Temp\7zS0CA85B04\Fri1553f0ee90.exe
              Fri1553f0ee90.exe
              5⤵
              • Executes dropped EXE
              PID:4272
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c APPNAME7.exe
            4⤵
              PID:4144
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Fri15af75ee9b.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4116
              • C:\Users\Admin\AppData\Local\Temp\7zS0CA85B04\Fri15af75ee9b.exe
                Fri15af75ee9b.exe
                5⤵
                • Executes dropped EXE
                PID:4304
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Fri157e25afd971.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1812
              • C:\Users\Admin\AppData\Local\Temp\7zS0CA85B04\Fri157e25afd971.exe
                Fri157e25afd971.exe
                5⤵
                • Executes dropped EXE
                PID:4284

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3336-134-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/3336-132-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/3336-148-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/3336-145-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/3336-133-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/3336-143-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/3336-141-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/4212-157-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

        Filesize

        4KB

      • memory/4272-167-0x0000000000980000-0x0000000000981000-memory.dmp

        Filesize

        4KB

      • memory/4284-172-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB