Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/09/2022, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe
Resource
win10v2004-20220812-en
General
-
Target
c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe
-
Size
3.3MB
-
MD5
85789ea37003222989924f328ed9d48f
-
SHA1
2005ffb1712ddaf29dc49eba98cfc6433499adaa
-
SHA256
c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409
-
SHA512
3f45b294b006dd6a45ed968188bff0e92b40cc05cb816a401b72c1674a45a786fcfeaee2ead6a57a444bc8958777d0cfb9dd9781e7f08041b50d01996a605377
-
SSDEEP
98304:2GSI7duNrGTaQw6H6dblr6rrDHWfmkGAP:bx7kFIx4hED2fz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 864 ppview32.exe -
Loads dropped DLL 6 IoCs
pid Process 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 864 ppview32.exe 864 ppview32.exe 864 ppview32.exe 864 ppview32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 38 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ = "SlideShowView" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib\ = "{FCE18140-B12B-11D0-B06A-00AA0060271A}" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib\Version = "2.0" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A} ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\0\win32 ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ = "_Application" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib\Version = "2.0" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\FLAGS\ = "0" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32 ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib\ = "{FCE18140-B12B-11D0-B06A-00AA0060271A}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\FLAGS ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ = "_Application" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib\ = "{FCE18140-B12B-11D0-B06A-00AA0060271A}" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib\Version = "2.0" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\ = "Microsoft PowerPointViewer 8.0 Object Library" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A} ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32 ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0 ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ = "SlideShowView" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32 ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A} ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib\ = "{FCE18140-B12B-11D0-B06A-00AA0060271A}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A} ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\0 ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\msppt8vr.olb" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\HELPDIR ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib\Version = "2.0" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32 ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A} ppview32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 864 ppview32.exe Token: SeIncBasePriorityPrivilege 864 ppview32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1660 wrote to memory of 864 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 28 PID 1660 wrote to memory of 864 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 28 PID 1660 wrote to memory of 864 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 28 PID 1660 wrote to memory of 864 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 28 PID 1660 wrote to memory of 864 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 28 PID 1660 wrote to memory of 864 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 28 PID 1660 wrote to memory of 864 1660 c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe"C:\Users\Admin\AppData\Local\Temp\c6bc6b5590f2550e02b2913ba96944106c461239d1bde59885a6e79e642d0409.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe EsbQsg.ppt2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53eebbf990d288202f09b0db9fcb40b5f
SHA10cfda5a8bd15f9ebb0d8004695cca3385fcf24a1
SHA256e3dacc0b1d2e5df379e164b9ebe23fd083e3c96aa65c499bb7c3295f99e68432
SHA512806571b05495bec1ae0283c73e311ed5c90e5d5df695054408e6fbfab13b4b323c4d5ad3e0b16cb940197c726b869bb69f33c4db0214ca7a993d8016128b738d
-
Filesize
80KB
MD592db419fd98b197e73b57997d83fea52
SHA1195246cff5e7f8fc313a7a47948a8f57b8b3ce08
SHA256e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97
SHA512a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b
-
Filesize
1.6MB
MD55a5abb409208ec32459aa1bc6f70b357
SHA136edf66cbf1020558e613d6cf91f790943e49ce5
SHA256f3159691bdf53f63b4e588c04333599e9086a0a7eb59bddac4d7331f5aff274f
SHA512801ec5d74bf0436dc54c9e22c5e941f5ea481c41fe618f06b4e139c36f6dcd9b1417be63353ee661c285312e5861d2c534ddecbd5ca7af851c8d706f8bf333ac
-
Filesize
223KB
MD50a97e3993a4d202275aaaf990fd4492e
SHA19ce5f40bc2271d6ab357031fe5c443e3e776a9ec
SHA256bdc49896d6a38f4d6ae3ca3b42233ba4bd4842e35a4459386e9c7d12fa15b640
SHA51264c778bdb7e30725a1e32a69d24643223bfe0913be6c0339106bb3b1d99eaa4549386ab2bf7d553a0ad1b72f1bb3250a43387088336e768ac0f2e13b8abf4e07
-
Filesize
154KB
MD55c5faeebdcc03ab60a8f968d9fd56548
SHA1f0633c6d4238cb59c7cdfa4ea2aeca0019901e67
SHA256366ed2fa94f707f7cf0800771d8daae8574ce5d1bab2b4bebd1e92d84a2d6fe8
SHA51271c70d82c673188063f43b6ba50c21fc048e397e62df87f489dd90e96c788168b55de56f952790f2f0a386bb5c120c94980131c5a527939564de8efbb07cf37f
-
Filesize
5KB
MD52c78fccd977621990cf608f0f5a50740
SHA153bbaa08ec35b092f7a08a53b7e8b2da744d7052
SHA256b1c6335b894d68979a48b7460c2d476d7c32a2fa67d24c89bb26c9b621a6a5a9
SHA51253da3decc95513b11707393028df4bad28e48d29526c654aa0ced10549a38d4f0572246dd8ea09dfcf6f4688c3b7c4c41c54586916ee3355c7e2887e93dde2fb
-
Filesize
1.4MB
MD5e00540bd2e24a5076116f84d79e9dfda
SHA1b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9
SHA256d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6
SHA5122f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6
-
Filesize
1.4MB
MD5e00540bd2e24a5076116f84d79e9dfda
SHA1b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9
SHA256d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6
SHA5122f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6
-
Filesize
80KB
MD592db419fd98b197e73b57997d83fea52
SHA1195246cff5e7f8fc313a7a47948a8f57b8b3ce08
SHA256e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97
SHA512a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b
-
Filesize
1.6MB
MD55a5abb409208ec32459aa1bc6f70b357
SHA136edf66cbf1020558e613d6cf91f790943e49ce5
SHA256f3159691bdf53f63b4e588c04333599e9086a0a7eb59bddac4d7331f5aff274f
SHA512801ec5d74bf0436dc54c9e22c5e941f5ea481c41fe618f06b4e139c36f6dcd9b1417be63353ee661c285312e5861d2c534ddecbd5ca7af851c8d706f8bf333ac
-
Filesize
154KB
MD55c5faeebdcc03ab60a8f968d9fd56548
SHA1f0633c6d4238cb59c7cdfa4ea2aeca0019901e67
SHA256366ed2fa94f707f7cf0800771d8daae8574ce5d1bab2b4bebd1e92d84a2d6fe8
SHA51271c70d82c673188063f43b6ba50c21fc048e397e62df87f489dd90e96c788168b55de56f952790f2f0a386bb5c120c94980131c5a527939564de8efbb07cf37f
-
Filesize
1.4MB
MD5e00540bd2e24a5076116f84d79e9dfda
SHA1b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9
SHA256d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6
SHA5122f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6
-
Filesize
1.4MB
MD5e00540bd2e24a5076116f84d79e9dfda
SHA1b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9
SHA256d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6
SHA5122f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6
-
Filesize
1.4MB
MD5e00540bd2e24a5076116f84d79e9dfda
SHA1b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9
SHA256d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6
SHA5122f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6