Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2022, 08:04

General

  • Target

    c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe

  • Size

    3.3MB

  • MD5

    85789ea37003222989924f328ed9d48f

  • SHA1

    2005ffb1712ddaf29dc49eba98cfc6433499adaa

  • SHA256

    c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409

  • SHA512

    3f45b294b006dd6a45ed968188bff0e92b40cc05cb816a401b72c1674a45a786fcfeaee2ead6a57a444bc8958777d0cfb9dd9781e7f08041b50d01996a605377

  • SSDEEP

    98304:2GSI7duNrGTaQw6H6dblr6rrDHWfmkGAP:bx7kFIx4hED2fz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe
    "C:\Users\Admin\AppData\Local\Temp\c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe EsbQsg.ppt
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EsbQsg.ppt

    Filesize

    1.1MB

    MD5

    3eebbf990d288202f09b0db9fcb40b5f

    SHA1

    0cfda5a8bd15f9ebb0d8004695cca3385fcf24a1

    SHA256

    e3dacc0b1d2e5df379e164b9ebe23fd083e3c96aa65c499bb7c3295f99e68432

    SHA512

    806571b05495bec1ae0283c73e311ed5c90e5d5df695054408e6fbfab13b4b323c4d5ad3e0b16cb940197c726b869bb69f33c4db0214ca7a993d8016128b738d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HLink.dll

    Filesize

    80KB

    MD5

    92db419fd98b197e73b57997d83fea52

    SHA1

    195246cff5e7f8fc313a7a47948a8f57b8b3ce08

    SHA256

    e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97

    SHA512

    a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSO97v.DLL

    Filesize

    1.6MB

    MD5

    5a5abb409208ec32459aa1bc6f70b357

    SHA1

    36edf66cbf1020558e613d6cf91f790943e49ce5

    SHA256

    f3159691bdf53f63b4e588c04333599e9086a0a7eb59bddac4d7331f5aff274f

    SHA512

    801ec5d74bf0436dc54c9e22c5e941f5ea481c41fe618f06b4e139c36f6dcd9b1417be63353ee661c285312e5861d2c534ddecbd5ca7af851c8d706f8bf333ac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSV7ENU.DLL

    Filesize

    223KB

    MD5

    0a97e3993a4d202275aaaf990fd4492e

    SHA1

    9ce5f40bc2271d6ab357031fe5c443e3e776a9ec

    SHA256

    bdc49896d6a38f4d6ae3ca3b42233ba4bd4842e35a4459386e9c7d12fa15b640

    SHA512

    64c778bdb7e30725a1e32a69d24643223bfe0913be6c0339106bb3b1d99eaa4549386ab2bf7d553a0ad1b72f1bb3250a43387088336e768ac0f2e13b8abf4e07

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PPIntlv.DLL

    Filesize

    154KB

    MD5

    5c5faeebdcc03ab60a8f968d9fd56548

    SHA1

    f0633c6d4238cb59c7cdfa4ea2aeca0019901e67

    SHA256

    366ed2fa94f707f7cf0800771d8daae8574ce5d1bab2b4bebd1e92d84a2d6fe8

    SHA512

    71c70d82c673188063f43b6ba50c21fc048e397e62df87f489dd90e96c788168b55de56f952790f2f0a386bb5c120c94980131c5a527939564de8efbb07cf37f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msppt8vr.olb

    Filesize

    5KB

    MD5

    2c78fccd977621990cf608f0f5a50740

    SHA1

    53bbaa08ec35b092f7a08a53b7e8b2da744d7052

    SHA256

    b1c6335b894d68979a48b7460c2d476d7c32a2fa67d24c89bb26c9b621a6a5a9

    SHA512

    53da3decc95513b11707393028df4bad28e48d29526c654aa0ced10549a38d4f0572246dd8ea09dfcf6f4688c3b7c4c41c54586916ee3355c7e2887e93dde2fb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe

    Filesize

    1.4MB

    MD5

    e00540bd2e24a5076116f84d79e9dfda

    SHA1

    b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9

    SHA256

    d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6

    SHA512

    2f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe

    Filesize

    1.4MB

    MD5

    e00540bd2e24a5076116f84d79e9dfda

    SHA1

    b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9

    SHA256

    d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6

    SHA512

    2f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hlink.dll

    Filesize

    80KB

    MD5

    92db419fd98b197e73b57997d83fea52

    SHA1

    195246cff5e7f8fc313a7a47948a8f57b8b3ce08

    SHA256

    e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97

    SHA512

    a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\mso97v.dll

    Filesize

    1.6MB

    MD5

    5a5abb409208ec32459aa1bc6f70b357

    SHA1

    36edf66cbf1020558e613d6cf91f790943e49ce5

    SHA256

    f3159691bdf53f63b4e588c04333599e9086a0a7eb59bddac4d7331f5aff274f

    SHA512

    801ec5d74bf0436dc54c9e22c5e941f5ea481c41fe618f06b4e139c36f6dcd9b1417be63353ee661c285312e5861d2c534ddecbd5ca7af851c8d706f8bf333ac

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ppintlv.dll

    Filesize

    154KB

    MD5

    5c5faeebdcc03ab60a8f968d9fd56548

    SHA1

    f0633c6d4238cb59c7cdfa4ea2aeca0019901e67

    SHA256

    366ed2fa94f707f7cf0800771d8daae8574ce5d1bab2b4bebd1e92d84a2d6fe8

    SHA512

    71c70d82c673188063f43b6ba50c21fc048e397e62df87f489dd90e96c788168b55de56f952790f2f0a386bb5c120c94980131c5a527939564de8efbb07cf37f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe

    Filesize

    1.4MB

    MD5

    e00540bd2e24a5076116f84d79e9dfda

    SHA1

    b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9

    SHA256

    d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6

    SHA512

    2f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe

    Filesize

    1.4MB

    MD5

    e00540bd2e24a5076116f84d79e9dfda

    SHA1

    b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9

    SHA256

    d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6

    SHA512

    2f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe

    Filesize

    1.4MB

    MD5

    e00540bd2e24a5076116f84d79e9dfda

    SHA1

    b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9

    SHA256

    d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6

    SHA512

    2f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6

  • memory/1660-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

    Filesize

    8KB