Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16/09/2022, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
357KB
-
MD5
90da1762f13362256f04cb65a89eef8c
-
SHA1
9ff737f33233ce5049bd663a190685bd0286c406
-
SHA256
6bef62653d807b4916c39deb44dcc47e908158a74439903172583c8685cf2077
-
SHA512
9f084e3e24f782c134464db127af79ad1eec166101bdda5c32565835a92e6ba63b789a56c5218b2c7c7d7c7220850836da7649729c6899b2ba5d44d3667a2192
-
SSDEEP
6144:Fs2ZQfZusO6BG6GUjvIH6rvmoqU76E0Nniga:FnZnsONuvs6TF74Ni
Malware Config
Extracted
Family
nymaim
C2
208.67.104.97
85.31.46.167
Signatures
-
Deletes itself 1 IoCs
pid Process 1500 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 544 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 544 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1500 1652 file.exe 30 PID 1652 wrote to memory of 1500 1652 file.exe 30 PID 1652 wrote to memory of 1500 1652 file.exe 30 PID 1652 wrote to memory of 1500 1652 file.exe 30 PID 1500 wrote to memory of 544 1500 cmd.exe 32 PID 1500 wrote to memory of 544 1500 cmd.exe 32 PID 1500 wrote to memory of 544 1500 cmd.exe 32 PID 1500 wrote to memory of 544 1500 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "file.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\file.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "file.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-