Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
17s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01/01/2022, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
config.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
config.exe
Resource
win10-en-20211208
General
-
Target
config.exe
-
Size
2.1MB
-
MD5
cf351819c69c94fbdaec24cb8c30990b
-
SHA1
4911d5384ca3720c48a0c8ba47b1edba33dfa0ff
-
SHA256
25d18c3823a3b210a18e69c823ce4c59fab298c315ac2a5d891027921d1c6d7e
-
SHA512
c6ed66e7a0afa76ff2c583b91e90ed8a193af8c25ba5e81e29be652bbbdfaf1fa62047826066f8ebc3677873e6a75237103ec4dc61544c3e5c11eff2b401c5b9
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ExportTest.png => C:\Users\Admin\Pictures\ExportTest.png.xyz config.exe File renamed C:\Users\Admin\Pictures\ExportWait.raw => C:\Users\Admin\Pictures\ExportWait.raw.xyz config.exe File renamed C:\Users\Admin\Pictures\UninstallSelect.tif => C:\Users\Admin\Pictures\UninstallSelect.tif.xyz config.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 13 IoCs
description ioc Process File created C:\Users\Admin\Saved Games\desktop.ini config.exe File created C:\Users\Admin\Desktop\desktop.ini config.exe File created C:\Users\Admin\Downloads\desktop.ini config.exe File created C:\Users\Admin\Favorites\Links\desktop.ini config.exe File created C:\Users\Admin\Favorites\desktop.ini config.exe File created C:\Users\Admin\Links\desktop.ini config.exe File created C:\Users\Admin\Music\desktop.ini config.exe File created C:\Users\Admin\Contacts\desktop.ini config.exe File created C:\Users\Admin\Documents\desktop.ini config.exe File created C:\Users\Admin\Favorites\Links for United States\desktop.ini config.exe File created C:\Users\Admin\Pictures\desktop.ini config.exe File created C:\Users\Admin\Searches\desktop.ini config.exe File created C:\Users\Admin\Videos\desktop.ini config.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: cipher.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1768 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1692 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1688 powershell.exe 1688 powershell.exe 1688 powershell.exe 1872 powershell.exe 1660 powershell.exe 1660 powershell.exe 1660 powershell.exe 2024 powershell.exe 1120 powershell.exe 1120 powershell.exe 1120 powershell.exe 852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 516 wmic.exe Token: SeSecurityPrivilege 516 wmic.exe Token: SeTakeOwnershipPrivilege 516 wmic.exe Token: SeLoadDriverPrivilege 516 wmic.exe Token: SeSystemProfilePrivilege 516 wmic.exe Token: SeSystemtimePrivilege 516 wmic.exe Token: SeProfSingleProcessPrivilege 516 wmic.exe Token: SeIncBasePriorityPrivilege 516 wmic.exe Token: SeCreatePagefilePrivilege 516 wmic.exe Token: SeBackupPrivilege 516 wmic.exe Token: SeRestorePrivilege 516 wmic.exe Token: SeShutdownPrivilege 516 wmic.exe Token: SeDebugPrivilege 516 wmic.exe Token: SeSystemEnvironmentPrivilege 516 wmic.exe Token: SeRemoteShutdownPrivilege 516 wmic.exe Token: SeUndockPrivilege 516 wmic.exe Token: SeManageVolumePrivilege 516 wmic.exe Token: 33 516 wmic.exe Token: 34 516 wmic.exe Token: 35 516 wmic.exe Token: SeIncreaseQuotaPrivilege 516 wmic.exe Token: SeSecurityPrivilege 516 wmic.exe Token: SeTakeOwnershipPrivilege 516 wmic.exe Token: SeLoadDriverPrivilege 516 wmic.exe Token: SeSystemProfilePrivilege 516 wmic.exe Token: SeSystemtimePrivilege 516 wmic.exe Token: SeProfSingleProcessPrivilege 516 wmic.exe Token: SeIncBasePriorityPrivilege 516 wmic.exe Token: SeCreatePagefilePrivilege 516 wmic.exe Token: SeBackupPrivilege 516 wmic.exe Token: SeRestorePrivilege 516 wmic.exe Token: SeShutdownPrivilege 516 wmic.exe Token: SeDebugPrivilege 516 wmic.exe Token: SeSystemEnvironmentPrivilege 516 wmic.exe Token: SeRemoteShutdownPrivilege 516 wmic.exe Token: SeUndockPrivilege 516 wmic.exe Token: SeManageVolumePrivilege 516 wmic.exe Token: 33 516 wmic.exe Token: 34 516 wmic.exe Token: 35 516 wmic.exe Token: SeIncreaseQuotaPrivilege 1320 wmic.exe Token: SeSecurityPrivilege 1320 wmic.exe Token: SeTakeOwnershipPrivilege 1320 wmic.exe Token: SeLoadDriverPrivilege 1320 wmic.exe Token: SeSystemProfilePrivilege 1320 wmic.exe Token: SeSystemtimePrivilege 1320 wmic.exe Token: SeProfSingleProcessPrivilege 1320 wmic.exe Token: SeIncBasePriorityPrivilege 1320 wmic.exe Token: SeCreatePagefilePrivilege 1320 wmic.exe Token: SeBackupPrivilege 1320 wmic.exe Token: SeRestorePrivilege 1320 wmic.exe Token: SeShutdownPrivilege 1320 wmic.exe Token: SeDebugPrivilege 1320 wmic.exe Token: SeSystemEnvironmentPrivilege 1320 wmic.exe Token: SeRemoteShutdownPrivilege 1320 wmic.exe Token: SeUndockPrivilege 1320 wmic.exe Token: SeManageVolumePrivilege 1320 wmic.exe Token: 33 1320 wmic.exe Token: 34 1320 wmic.exe Token: 35 1320 wmic.exe Token: SeIncreaseQuotaPrivilege 1320 wmic.exe Token: SeSecurityPrivilege 1320 wmic.exe Token: SeTakeOwnershipPrivilege 1320 wmic.exe Token: SeLoadDriverPrivilege 1320 wmic.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 288 wrote to memory of 516 288 config.exe 28 PID 288 wrote to memory of 516 288 config.exe 28 PID 288 wrote to memory of 516 288 config.exe 28 PID 288 wrote to memory of 1320 288 config.exe 30 PID 288 wrote to memory of 1320 288 config.exe 30 PID 288 wrote to memory of 1320 288 config.exe 30 PID 288 wrote to memory of 1688 288 config.exe 31 PID 288 wrote to memory of 1688 288 config.exe 31 PID 288 wrote to memory of 1688 288 config.exe 31 PID 1688 wrote to memory of 1872 1688 powershell.exe 33 PID 1688 wrote to memory of 1872 1688 powershell.exe 33 PID 1688 wrote to memory of 1872 1688 powershell.exe 33 PID 288 wrote to memory of 1660 288 config.exe 35 PID 288 wrote to memory of 1660 288 config.exe 35 PID 288 wrote to memory of 1660 288 config.exe 35 PID 1872 wrote to memory of 1768 1872 powershell.exe 36 PID 1872 wrote to memory of 1768 1872 powershell.exe 36 PID 1872 wrote to memory of 1768 1872 powershell.exe 36 PID 1660 wrote to memory of 2024 1660 powershell.exe 37 PID 1660 wrote to memory of 2024 1660 powershell.exe 37 PID 1660 wrote to memory of 2024 1660 powershell.exe 37 PID 288 wrote to memory of 1904 288 config.exe 39 PID 288 wrote to memory of 1904 288 config.exe 39 PID 288 wrote to memory of 1904 288 config.exe 39 PID 288 wrote to memory of 1120 288 config.exe 41 PID 288 wrote to memory of 1120 288 config.exe 41 PID 288 wrote to memory of 1120 288 config.exe 41 PID 2024 wrote to memory of 1668 2024 powershell.exe 42 PID 2024 wrote to memory of 1668 2024 powershell.exe 42 PID 2024 wrote to memory of 1668 2024 powershell.exe 42 PID 1120 wrote to memory of 852 1120 powershell.exe 44 PID 1120 wrote to memory of 852 1120 powershell.exe 44 PID 1120 wrote to memory of 852 1120 powershell.exe 44 PID 852 wrote to memory of 1752 852 powershell.exe 46 PID 852 wrote to memory of 1752 852 powershell.exe 46 PID 852 wrote to memory of 1752 852 powershell.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\config.exe"C:\Users\Admin\AppData\Local\Temp\config.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\System32\Wbem\wmic.exewmic MEMORYCHIP get Capacity2⤵
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\System32\Wbem\wmic.exewmic logicaldisk get name2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process powershell -windowstyle hidden "{vssadmin delete shadows /all /quiet}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" vssadmin delete shadows /all /quiet3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1768
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process powershell -windowstyle hidden "{ cipher /w:C:\}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cipher /w:C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\cipher.exe"C:\Windows\system32\cipher.exe" /w:C:\4⤵PID:1668
-
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic logicaldisk get name2⤵PID:1904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process powershell -windowstyle hidden "{ cipher /w:D:\}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cipher /w:D:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\cipher.exe"C:\Windows\system32\cipher.exe" /w:D:\4⤵
- Enumerates connected drives
PID:1752
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1764
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1320
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\_Readme_.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1692