Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe
Resource
win7-20220715-en
7 signatures
150 seconds
General
-
Target
4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe
-
Size
496KB
-
MD5
1e47a80f9e077c1f08fc49d35883b5d9
-
SHA1
8b40a8b811ea2d18c6ac5caf6151b3f7ac8eeebd
-
SHA256
4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6
-
SHA512
442f9558e1bec6a817d5d4735aedde62d953877b40e49d1ed04df6a9792aaa57c10e1ca41be468f8dbf8f71b6393d82778a155053eb1a47253043e3f20db65fe
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat soundswfp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings soundswfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 soundswfp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{47005D75-3E5B-451B-A1EC-E55F5036B8F1} soundswfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{47005D75-3E5B-451B-A1EC-E55F5036B8F1}\WpadDecisionReason = "1" soundswfp.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{47005D75-3E5B-451B-A1EC-E55F5036B8F1}\WpadNetworkName = "Network 3" soundswfp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{47005D75-3E5B-451B-A1EC-E55F5036B8F1}\96-4f-74-58-7d-c3 soundswfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-4f-74-58-7d-c3\WpadDecisionReason = "1" soundswfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-4f-74-58-7d-c3\WpadDecisionTime = 80d9d8ea489cd801 soundswfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-4f-74-58-7d-c3\WpadDecisionTime = 20e02128499cd801 soundswfp.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-4f-74-58-7d-c3\WpadDetectedUrl soundswfp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings soundswfp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections soundswfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 soundswfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 soundswfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{47005D75-3E5B-451B-A1EC-E55F5036B8F1}\WpadDecisionTime = 80d9d8ea489cd801 soundswfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{47005D75-3E5B-451B-A1EC-E55F5036B8F1}\WpadDecision = "0" soundswfp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-4f-74-58-7d-c3 soundswfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 soundswfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{47005D75-3E5B-451B-A1EC-E55F5036B8F1}\WpadDecisionTime = 20e02128499cd801 soundswfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" soundswfp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad soundswfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-4f-74-58-7d-c3\WpadDecision = "0" soundswfp.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2012 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 316 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 1344 soundswfp.exe 1164 soundswfp.exe 1164 soundswfp.exe 1164 soundswfp.exe 1164 soundswfp.exe 1164 soundswfp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 316 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 316 2012 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 27 PID 2012 wrote to memory of 316 2012 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 27 PID 2012 wrote to memory of 316 2012 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 27 PID 2012 wrote to memory of 316 2012 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 27 PID 1344 wrote to memory of 1164 1344 soundswfp.exe 29 PID 1344 wrote to memory of 1164 1344 soundswfp.exe 29 PID 1344 wrote to memory of 1164 1344 soundswfp.exe 29 PID 1344 wrote to memory of 1164 1344 soundswfp.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe"C:\Users\Admin\AppData\Local\Temp\4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe"C:\Users\Admin\AppData\Local\Temp\4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:316
-
-
C:\Windows\SysWOW64\soundswfp.exe"C:\Windows\SysWOW64\soundswfp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\soundswfp.exe"C:\Windows\SysWOW64\soundswfp.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1164
-