Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17/09/2022, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
payment receipt.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
payment receipt.exe
Resource
win10v2004-20220812-en
General
-
Target
payment receipt.exe
-
Size
114KB
-
MD5
3fcc05a4ba117e0f0b24c35209acd6ae
-
SHA1
eeb001753c26710a2c0b235d4fc22f44a8a3661f
-
SHA256
fbe01e695b2a6b560da2025bc32a0269b9a4b97417ae6982e99c35cd14352ff9
-
SHA512
2c6c1d36b13f3b79b1f64fe4639cab9011bdac33321d7216fdefe381ab942fd02e656668cf3d0c4119617c1e93fbfecdbb80888a762e18cfbb7857b1013032e4
-
SSDEEP
3072:STJ4TJdRVDZ6Lt+uQNb2QXt1kWtAf3RqaQMVWRKwoRfZyeDp+8q9:SVGdx6xK2Mtmg2345jcNZpQ
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe payment receipt.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe payment receipt.exe -
Loads dropped DLL 1 IoCs
pid Process 1048 payment receipt.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1048 payment receipt.exe 612 payment receipt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1048 set thread context of 612 1048 payment receipt.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1048 payment receipt.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1048 wrote to memory of 612 1048 payment receipt.exe 27 PID 1048 wrote to memory of 612 1048 payment receipt.exe 27 PID 1048 wrote to memory of 612 1048 payment receipt.exe 27 PID 1048 wrote to memory of 612 1048 payment receipt.exe 27 PID 1048 wrote to memory of 612 1048 payment receipt.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\payment receipt.exe"C:\Users\Admin\AppData\Local\Temp\payment receipt.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\payment receipt.exe"C:\Users\Admin\AppData\Local\Temp\payment receipt.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4