Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/09/2022, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
2185f9871584f842f3860887b2b05c5e.exe
Resource
win7-20220901-en
General
-
Target
2185f9871584f842f3860887b2b05c5e.exe
-
Size
5.1MB
-
MD5
2185f9871584f842f3860887b2b05c5e
-
SHA1
f7ff56cf61da3989bf014f06f5372de1b33ded93
-
SHA256
21399a0ba530065b123a8e27789516d3b5bc3524f399b54fcec1df2a8cf54a01
-
SHA512
fdcd621fa19139d2ca84145d02ac2a87bb8058d737889e85e0a5101a2f9916bdd1c1a794becaa35042c97cb56704ba0ae5cfd13f26f1b2ee6518efac3babf23a
-
SSDEEP
49152:2PFJCvLqOaSTK5ISawpVpVliC8TkxY+kut4pRju5lhnsVfB0n7:2PFsjqOaSFUK+kumpRyBsV50n7
Malware Config
Extracted
nymaim
208.67.104.97
85.31.46.167
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1152 syctem.exe 948 syctem.exe -
Loads dropped DLL 2 IoCs
pid Process 1464 2185f9871584f842f3860887b2b05c5e.exe 1464 2185f9871584f842f3860887b2b05c5e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1152 set thread context of 948 1152 syctem.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1004 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1004 taskkill.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1152 1464 2185f9871584f842f3860887b2b05c5e.exe 26 PID 1464 wrote to memory of 1152 1464 2185f9871584f842f3860887b2b05c5e.exe 26 PID 1464 wrote to memory of 1152 1464 2185f9871584f842f3860887b2b05c5e.exe 26 PID 1464 wrote to memory of 1152 1464 2185f9871584f842f3860887b2b05c5e.exe 26 PID 1152 wrote to memory of 948 1152 syctem.exe 27 PID 1152 wrote to memory of 948 1152 syctem.exe 27 PID 1152 wrote to memory of 948 1152 syctem.exe 27 PID 1152 wrote to memory of 948 1152 syctem.exe 27 PID 1152 wrote to memory of 948 1152 syctem.exe 27 PID 1152 wrote to memory of 948 1152 syctem.exe 27 PID 948 wrote to memory of 1840 948 syctem.exe 30 PID 948 wrote to memory of 1840 948 syctem.exe 30 PID 948 wrote to memory of 1840 948 syctem.exe 30 PID 948 wrote to memory of 1840 948 syctem.exe 30 PID 1840 wrote to memory of 1004 1840 cmd.exe 32 PID 1840 wrote to memory of 1004 1840 cmd.exe 32 PID 1840 wrote to memory of 1004 1840 cmd.exe 32 PID 1840 wrote to memory of 1004 1840 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2185f9871584f842f3860887b2b05c5e.exe"C:\Users\Admin\AppData\Local\Temp\2185f9871584f842f3860887b2b05c5e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe"C:\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe"C:\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "syctem.exe" /f & erase "C:\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "syctem.exe" /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe
Filesize1.4MB
MD59611edc9756cd88b1a5d4ffba1a6bd6a
SHA1eef49dff573df3b8d26005943266097cb08f5753
SHA25666de49238e75068fbe3933815dafad1b7f4e6f00980ca7598468b7907913d64e
SHA512a5f56284ab266582fe367618f3897b00b90853f35b55fafa3a7b456d55f7a3e1a1c6b7b47421c97980813a0ee4193c5f3381d1e270c882f3e10b03ceec295540
-
C:\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe
Filesize1.4MB
MD59611edc9756cd88b1a5d4ffba1a6bd6a
SHA1eef49dff573df3b8d26005943266097cb08f5753
SHA25666de49238e75068fbe3933815dafad1b7f4e6f00980ca7598468b7907913d64e
SHA512a5f56284ab266582fe367618f3897b00b90853f35b55fafa3a7b456d55f7a3e1a1c6b7b47421c97980813a0ee4193c5f3381d1e270c882f3e10b03ceec295540
-
C:\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe
Filesize1.4MB
MD59611edc9756cd88b1a5d4ffba1a6bd6a
SHA1eef49dff573df3b8d26005943266097cb08f5753
SHA25666de49238e75068fbe3933815dafad1b7f4e6f00980ca7598468b7907913d64e
SHA512a5f56284ab266582fe367618f3897b00b90853f35b55fafa3a7b456d55f7a3e1a1c6b7b47421c97980813a0ee4193c5f3381d1e270c882f3e10b03ceec295540
-
\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe
Filesize1.4MB
MD59611edc9756cd88b1a5d4ffba1a6bd6a
SHA1eef49dff573df3b8d26005943266097cb08f5753
SHA25666de49238e75068fbe3933815dafad1b7f4e6f00980ca7598468b7907913d64e
SHA512a5f56284ab266582fe367618f3897b00b90853f35b55fafa3a7b456d55f7a3e1a1c6b7b47421c97980813a0ee4193c5f3381d1e270c882f3e10b03ceec295540
-
\ProgramData\All rights reserved 2022 Registered trademark of Corporation\Create a self Broadcast\Create a self Broadcast\{20ACABA4-D365D9-4DF4-B3fgdDA-2DF6A95A6318}\syctem.exe
Filesize1.4MB
MD59611edc9756cd88b1a5d4ffba1a6bd6a
SHA1eef49dff573df3b8d26005943266097cb08f5753
SHA25666de49238e75068fbe3933815dafad1b7f4e6f00980ca7598468b7907913d64e
SHA512a5f56284ab266582fe367618f3897b00b90853f35b55fafa3a7b456d55f7a3e1a1c6b7b47421c97980813a0ee4193c5f3381d1e270c882f3e10b03ceec295540