Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
10/05/2022, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe
Resource
win7-20220414-en
General
-
Target
6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe
-
Size
14.3MB
-
MD5
5e0106229cce715f5bd9cbf6900151a5
-
SHA1
ff2dc3a10c73f97af1fff889de9e065c703b3c2a
-
SHA256
6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6
-
SHA512
c7ca330cfb82114fd125e5f752bf6c66b5c3a1098420f26193a13fd83d07a112055796e4e463a01df8330635abf4a0c0f3824075026e8e9e6900812d960ccaed
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1148 Ex.exe 1204 ExtrimHack [free][20.08.2020].exe 1572 csrss.com 1996 csrss.com -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sys.url csrss.com -
Loads dropped DLL 5 IoCs
pid Process 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 1876 cmd.exe 1572 csrss.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1180 PING.EXE 936 PING.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1572 csrss.com 1572 csrss.com 1572 csrss.com 1996 csrss.com 1996 csrss.com 1996 csrss.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1572 csrss.com 1572 csrss.com 1572 csrss.com 1996 csrss.com 1996 csrss.com 1996 csrss.com -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1148 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 27 PID 2004 wrote to memory of 1148 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 27 PID 2004 wrote to memory of 1148 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 27 PID 2004 wrote to memory of 1148 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 27 PID 2004 wrote to memory of 1204 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 28 PID 2004 wrote to memory of 1204 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 28 PID 2004 wrote to memory of 1204 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 28 PID 2004 wrote to memory of 1204 2004 6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe 28 PID 1148 wrote to memory of 604 1148 Ex.exe 29 PID 1148 wrote to memory of 604 1148 Ex.exe 29 PID 1148 wrote to memory of 604 1148 Ex.exe 29 PID 1148 wrote to memory of 604 1148 Ex.exe 29 PID 1148 wrote to memory of 1488 1148 Ex.exe 31 PID 1148 wrote to memory of 1488 1148 Ex.exe 31 PID 1148 wrote to memory of 1488 1148 Ex.exe 31 PID 1148 wrote to memory of 1488 1148 Ex.exe 31 PID 1488 wrote to memory of 1876 1488 cmd.exe 33 PID 1488 wrote to memory of 1876 1488 cmd.exe 33 PID 1488 wrote to memory of 1876 1488 cmd.exe 33 PID 1488 wrote to memory of 1876 1488 cmd.exe 33 PID 1876 wrote to memory of 1180 1876 cmd.exe 34 PID 1876 wrote to memory of 1180 1876 cmd.exe 34 PID 1876 wrote to memory of 1180 1876 cmd.exe 34 PID 1876 wrote to memory of 1180 1876 cmd.exe 34 PID 1876 wrote to memory of 1540 1876 cmd.exe 35 PID 1876 wrote to memory of 1540 1876 cmd.exe 35 PID 1876 wrote to memory of 1540 1876 cmd.exe 35 PID 1876 wrote to memory of 1540 1876 cmd.exe 35 PID 1876 wrote to memory of 1572 1876 cmd.exe 36 PID 1876 wrote to memory of 1572 1876 cmd.exe 36 PID 1876 wrote to memory of 1572 1876 cmd.exe 36 PID 1876 wrote to memory of 1572 1876 cmd.exe 36 PID 1876 wrote to memory of 936 1876 cmd.exe 37 PID 1876 wrote to memory of 936 1876 cmd.exe 37 PID 1876 wrote to memory of 936 1876 cmd.exe 37 PID 1876 wrote to memory of 936 1876 cmd.exe 37 PID 1572 wrote to memory of 1996 1572 csrss.com 38 PID 1572 wrote to memory of 1996 1572 csrss.com 38 PID 1572 wrote to memory of 1996 1572 csrss.com 38 PID 1572 wrote to memory of 1996 1572 csrss.com 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe"C:\Users\Admin\AppData\Local\Temp\6e7fa9b372b953fad0a4ac1e82fd3cec28274d276d027437a4cef1a0fc4193d6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\1337\Ex.exe"C:\Users\Admin\AppData\Roaming\1337\Ex.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo pUVyOKPt3⤵PID:604
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Users\Admin\AppData\Roaming\Sysfiles & cmd < XuGJAWtEjFqgoZUl.com3⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\PING.EXEping -n 1 moLu.nnnbID5⤵
- Runs ping.exe
PID:1180
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode qTh.com y5⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.comcsrss.com y5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com y6⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1996
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 305⤵
- Runs ping.exe
PID:936
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\1337\ExtrimHack [free][20.08.2020].exe"C:\Users\Admin\AppData\Roaming\1337\ExtrimHack [free][20.08.2020].exe"2⤵
- Executes dropped EXE
PID:1204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD5c317736793ef5129f12a3568cd679422
SHA1e68b55969c5f2159c847a629fac3731c0c315d53
SHA256cbb5d906c63cbcb891b35e53156b643ac26c5dec922f43b2fd121ccca60beb62
SHA51269cb5fd5f1a30c3c786ca945b8de6a460d03605fc3416a3c33e69691603e1a43ad0cfefe9cd5d6af1a154b701ecf34526cc05d9235a4e38acf994eb0edb1a82c
-
Filesize
398B
MD50047726ce0f38e02fda2068d7ff7ceff
SHA10702fd3e290b95b70b5fc3b70cdb57c808baceb7
SHA2560423e080422306752ccf52e4639a8f6e58596176e730d10bd812012ccf4f296b
SHA51200b525c341b3297e3b011065b32bab9d29eee920e7faebea93e4fcc4fef69b166c11c10291cc9ba9b931551eca3dc9ddae27b681c4d4423478ea3a65d29c7d83
-
Filesize
2.3MB
MD509cc8b02108c2ca6db6197e37b165a65
SHA19f245c5206ce171cfc288ed8bf05896d1b36a1f0
SHA25689ad1822d2ee2d5e39d2e4aae2016562244f7ea43071c192e8989a3c2544d998
SHA512d50c20b554dd85996f8b7432fb3d3668c3fbfcd77314a4adc476861373a0350b122be61ab1aa087153e45c48cf6a453d0829ccfa4786cf679ee3dccb7cffadae
-
Filesize
921KB
MD58ed172328f643375ac09b31ffba0eb63
SHA1c6716e5e5a311f597e37c5660b0387ab8f77b2a0
SHA25623e87924005aeef08ab3c9402aa749c0373ed9fa6c1706c13ca1df5ec33f8928
SHA51279efbac3cbf2bbbf1b5572a3036845fd544210a01adf9850d22587df12fd84832e14e8f7e0476955a8d9bb42ff0be5ca4443cee8e83dc396e70d850e31c60938
-
Filesize
921KB
MD58ed172328f643375ac09b31ffba0eb63
SHA1c6716e5e5a311f597e37c5660b0387ab8f77b2a0
SHA25623e87924005aeef08ab3c9402aa749c0373ed9fa6c1706c13ca1df5ec33f8928
SHA51279efbac3cbf2bbbf1b5572a3036845fd544210a01adf9850d22587df12fd84832e14e8f7e0476955a8d9bb42ff0be5ca4443cee8e83dc396e70d850e31c60938
-
Filesize
921KB
MD58ed172328f643375ac09b31ffba0eb63
SHA1c6716e5e5a311f597e37c5660b0387ab8f77b2a0
SHA25623e87924005aeef08ab3c9402aa749c0373ed9fa6c1706c13ca1df5ec33f8928
SHA51279efbac3cbf2bbbf1b5572a3036845fd544210a01adf9850d22587df12fd84832e14e8f7e0476955a8d9bb42ff0be5ca4443cee8e83dc396e70d850e31c60938
-
Filesize
1.1MB
MD513a508782d30a527e997a64996920287
SHA14628a103700d13b6f3920b3a8a06e9757bf0a9eb
SHA256e06ad6278f8cdccb51ed58aee3d6ba97bd770b2d8b827746e539770fc959354e
SHA512cd860c7c8eea0faf0e62f1e695f60c02050c284617265f3e9c11dac4e4cbea34cb656719ae6bdeb39a36dd1446bb443cbcf9c9f4a595c1749f9088d7c082d142
-
Filesize
842KB
MD5dbcc4336d132df084c59bbddff9693f5
SHA1172d404379f6d288db4eacaa11bf0fa1ccffa451
SHA256ea3b51ae7fb4264cd4aca28f02fa027bb25ce69a9ece5ff1f9f581b1ae62c84e
SHA512d7209e47c9ef7e8f0db4bc736828e79d745415dde0dbaa7b4d5a21d6ee3406b139f3565cdcae16911c330d3ebbe1bcbe77f5e40d2313909a3b7b58697d3d4e34
-
Filesize
3.1MB
MD57afcb8667f1ec33f0cc084936a8a4044
SHA1a2755123f3515fbfcbd5b1ab38c22fa757b8afa8
SHA2562304cf3b3d0753318d60c2769c535a164d5f56ee0343c59ac616036d95e8ad71
SHA512bc04b81c01df03b360c225709d2db3078d1fb45fc2a67713f5f5154d050c71e241c2c7590f510d9f7ac3a0a4bc820b3b171d96cb56d23c0496df184e527162b8
-
Filesize
3.1MB
MD57afcb8667f1ec33f0cc084936a8a4044
SHA1a2755123f3515fbfcbd5b1ab38c22fa757b8afa8
SHA2562304cf3b3d0753318d60c2769c535a164d5f56ee0343c59ac616036d95e8ad71
SHA512bc04b81c01df03b360c225709d2db3078d1fb45fc2a67713f5f5154d050c71e241c2c7590f510d9f7ac3a0a4bc820b3b171d96cb56d23c0496df184e527162b8
-
Filesize
11.3MB
MD52a6d0674847cb7e341ee60914d6e2637
SHA16a19dd12a50577e561d7900b0e6536d4e6315a59
SHA256698e5d666d16b229cabb1ee2fae52d879632c20df7ec471715290893f7df0be5
SHA51278f37e1f1d55ef2c866a0e7e0ddd6c8d048d03084cd5190019c214307162bda912026a22dfa181e32be8d4475cb7427ca1f1f4bf1f3556ed7cd4477f96aad993
-
Filesize
921KB
MD58ed172328f643375ac09b31ffba0eb63
SHA1c6716e5e5a311f597e37c5660b0387ab8f77b2a0
SHA25623e87924005aeef08ab3c9402aa749c0373ed9fa6c1706c13ca1df5ec33f8928
SHA51279efbac3cbf2bbbf1b5572a3036845fd544210a01adf9850d22587df12fd84832e14e8f7e0476955a8d9bb42ff0be5ca4443cee8e83dc396e70d850e31c60938
-
Filesize
921KB
MD58ed172328f643375ac09b31ffba0eb63
SHA1c6716e5e5a311f597e37c5660b0387ab8f77b2a0
SHA25623e87924005aeef08ab3c9402aa749c0373ed9fa6c1706c13ca1df5ec33f8928
SHA51279efbac3cbf2bbbf1b5572a3036845fd544210a01adf9850d22587df12fd84832e14e8f7e0476955a8d9bb42ff0be5ca4443cee8e83dc396e70d850e31c60938
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
3.1MB
MD57afcb8667f1ec33f0cc084936a8a4044
SHA1a2755123f3515fbfcbd5b1ab38c22fa757b8afa8
SHA2562304cf3b3d0753318d60c2769c535a164d5f56ee0343c59ac616036d95e8ad71
SHA512bc04b81c01df03b360c225709d2db3078d1fb45fc2a67713f5f5154d050c71e241c2c7590f510d9f7ac3a0a4bc820b3b171d96cb56d23c0496df184e527162b8
-
Filesize
11.3MB
MD52a6d0674847cb7e341ee60914d6e2637
SHA16a19dd12a50577e561d7900b0e6536d4e6315a59
SHA256698e5d666d16b229cabb1ee2fae52d879632c20df7ec471715290893f7df0be5
SHA51278f37e1f1d55ef2c866a0e7e0ddd6c8d048d03084cd5190019c214307162bda912026a22dfa181e32be8d4475cb7427ca1f1f4bf1f3556ed7cd4477f96aad993