Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    18/04/2022, 10:47

General

  • Target

    ?????????? ? ?????? ????? ???????? ?????-?????????.jse

  • Size

    5KB

  • MD5

    d330aad3bfd86656f6f3c9271ebefe27

  • SHA1

    442892ac4dc64348d009b8f7d1f8cb2d3522340b

  • SHA256

    1b89fbda3bb65e0f5c2f9aa178082d418393087f37f0a1cd3f68645eec4a834f

  • SHA512

    c869200fe3fcadeda670f78ab5ed327e7672d4b22b9ecdf6089c8aea9493b3f20e474f22a53a586cccdcc51cfe187dce08f38222bc6dc7621696175119bcdf9d

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Temp\__________ _ ______ _____ ________ _____-_________.jse"
    1⤵
    • Blocklisted process makes network request
    • Deletes itself
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\radC8069.tmp
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\radC8069.tmp
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\radC8069.tmp"
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:1384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\radC8069.tmp

    Filesize

    21KB

    MD5

    d3293ef33084014272f8242c7bd2405a

    SHA1

    b44dcfe43658f4491b3e039782f719190ba55b08

    SHA256

    fa0e3988be923fa2acf1f9456e3ba3b9bdeca33a3f4365cc6b206280967e7a1d

    SHA512

    67ff6a8fc8c8d0e267e862c083d01e98719501a860cb50d2b961296caaa957737f46c4361953e67dcb0b60fb3aa60e33f8613e76e748e60318e5b176373d18c3

  • memory/1384-89-0x00000000764C1000-0x00000000764C3000-memory.dmp

    Filesize

    8KB

  • memory/1876-55-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmp

    Filesize

    8KB