Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/09/2022, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
937592e8d5164990354cae18c3ef963a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
937592e8d5164990354cae18c3ef963a.exe
Resource
win10v2004-20220812-en
General
-
Target
937592e8d5164990354cae18c3ef963a.exe
-
Size
531KB
-
MD5
937592e8d5164990354cae18c3ef963a
-
SHA1
0ac874856572f169ce893e8e6d749e16d3a43c45
-
SHA256
f2a1be67db80f8995f4908be6fcc2148a0af3897561ccc6c0aa7c674d062db7b
-
SHA512
3202800ce5f40ccba1712f53d6b88e22d3a4b92672c1d22e1cd68d25b6bc0c2b5dc0e2857110358c0456d6143f3a3df3c4c427d16076a64121515516ca89cd76
-
SSDEEP
12288:q5iZvUxxc36rURUMK6jXc8RWi2TR7rGOjt9RRg/5Lb2M3njAds:q0vUxxEiMdjXBR8R7COZ9RRg5njAW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 937592e8d5164990354cae18c3ef963a.exe -
Executes dropped EXE 1 IoCs
pid Process 1220 s266.exe -
Loads dropped DLL 4 IoCs
pid Process 328 937592e8d5164990354cae18c3ef963a.exe 328 937592e8d5164990354cae18c3ef963a.exe 328 937592e8d5164990354cae18c3ef963a.exe 328 937592e8d5164990354cae18c3ef963a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 937592e8d5164990354cae18c3ef963a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 937592e8d5164990354cae18c3ef963a.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 328 937592e8d5164990354cae18c3ef963a.exe 1220 s266.exe 1220 s266.exe 1220 s266.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1220 s266.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1220 s266.exe 1220 s266.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 1220 328 937592e8d5164990354cae18c3ef963a.exe 27 PID 328 wrote to memory of 1220 328 937592e8d5164990354cae18c3ef963a.exe 27 PID 328 wrote to memory of 1220 328 937592e8d5164990354cae18c3ef963a.exe 27 PID 328 wrote to memory of 1220 328 937592e8d5164990354cae18c3ef963a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\937592e8d5164990354cae18c3ef963a.exe"C:\Users\Admin\AppData\Local\Temp\937592e8d5164990354cae18c3ef963a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\n266\s266.exe"C:\Users\Admin\AppData\Local\Temp\n266\s266.exe" 8f6c8ba77edaa613168ebe81OYAYYZUqNXiaG+c17GlfBGt/Y5vDz9xZ+X6EBInYZBdtnMV66Mnkcf3DiIFCvwCG2oAmOBM4jh5C1kHAdKSSXODxNGE6EP3ZFvvLAPm9f1+gVH5Y06Pe2dYYgUvsm/TlKCf4FydKyAeoKPdKvsQg+FA= /v "C:\Users\Admin\AppData\Local\Temp\937592e8d5164990354cae18c3ef963a.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD57102142ea8fd1e51646947341502307a
SHA1d334d9be108bae81d8cd0eaca4b3208c303aa931
SHA2564a2aa0f09b9942ec43d71ae00e3ac4153a737acbd4c904c24688ed47b0943638
SHA5128eb30b6a106703a05ce9e280f8044a6ca7dac2c6657e7ffe8ada79b4ef2a5381dd481a153d285cfb8aacb1550e71392a86a15ca0127d8dfa89457af931c971e8
-
Filesize
219KB
MD57102142ea8fd1e51646947341502307a
SHA1d334d9be108bae81d8cd0eaca4b3208c303aa931
SHA2564a2aa0f09b9942ec43d71ae00e3ac4153a737acbd4c904c24688ed47b0943638
SHA5128eb30b6a106703a05ce9e280f8044a6ca7dac2c6657e7ffe8ada79b4ef2a5381dd481a153d285cfb8aacb1550e71392a86a15ca0127d8dfa89457af931c971e8
-
Filesize
219KB
MD57102142ea8fd1e51646947341502307a
SHA1d334d9be108bae81d8cd0eaca4b3208c303aa931
SHA2564a2aa0f09b9942ec43d71ae00e3ac4153a737acbd4c904c24688ed47b0943638
SHA5128eb30b6a106703a05ce9e280f8044a6ca7dac2c6657e7ffe8ada79b4ef2a5381dd481a153d285cfb8aacb1550e71392a86a15ca0127d8dfa89457af931c971e8
-
Filesize
219KB
MD57102142ea8fd1e51646947341502307a
SHA1d334d9be108bae81d8cd0eaca4b3208c303aa931
SHA2564a2aa0f09b9942ec43d71ae00e3ac4153a737acbd4c904c24688ed47b0943638
SHA5128eb30b6a106703a05ce9e280f8044a6ca7dac2c6657e7ffe8ada79b4ef2a5381dd481a153d285cfb8aacb1550e71392a86a15ca0127d8dfa89457af931c971e8
-
Filesize
219KB
MD57102142ea8fd1e51646947341502307a
SHA1d334d9be108bae81d8cd0eaca4b3208c303aa931
SHA2564a2aa0f09b9942ec43d71ae00e3ac4153a737acbd4c904c24688ed47b0943638
SHA5128eb30b6a106703a05ce9e280f8044a6ca7dac2c6657e7ffe8ada79b4ef2a5381dd481a153d285cfb8aacb1550e71392a86a15ca0127d8dfa89457af931c971e8
-
Filesize
219KB
MD57102142ea8fd1e51646947341502307a
SHA1d334d9be108bae81d8cd0eaca4b3208c303aa931
SHA2564a2aa0f09b9942ec43d71ae00e3ac4153a737acbd4c904c24688ed47b0943638
SHA5128eb30b6a106703a05ce9e280f8044a6ca7dac2c6657e7ffe8ada79b4ef2a5381dd481a153d285cfb8aacb1550e71392a86a15ca0127d8dfa89457af931c971e8