Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe
Resource
win10v2004-20220812-en
General
-
Target
3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe
-
Size
96KB
-
MD5
67c3ef7b43566e275af9c20991dc4a2d
-
SHA1
27e206b91a72320e78b198d6f5e26e53aad04730
-
SHA256
3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9
-
SHA512
fe58c4f7cfbaec86c1b5d776df25b19a2001e33c5470bba7e8bd95a9c5d65e788f2c81439dc70b57d1511bfbe607128fabceb3e0ae009a377d352e9761002379
-
SSDEEP
1536:f4KTOGHcKhgnPZcHHTuipl/oUY3Fw8VLN:fpOYenPZcn3lgUYH
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1100 Rundll32.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 9 IoCs
pid Process 1532 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe 1100 Rundll32.exe 1100 Rundll32.exe 1100 Rundll32.exe 1100 Rundll32.exe 1100 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wlfknw.dll 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe File created C:\Windows\SysWOW64\tnifmw.dll 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\KAV\CDriver.sys Rundll32.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1692 sc.exe 944 sc.exe 1344 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1532 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe 1100 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1532 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 27 PID 1460 wrote to memory of 1532 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 27 PID 1460 wrote to memory of 1532 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 27 PID 1460 wrote to memory of 1532 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 27 PID 1460 wrote to memory of 1532 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 27 PID 1460 wrote to memory of 1532 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 27 PID 1460 wrote to memory of 1532 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 27 PID 1532 wrote to memory of 1332 1532 Rundll32.exe 28 PID 1532 wrote to memory of 1332 1532 Rundll32.exe 28 PID 1532 wrote to memory of 1332 1532 Rundll32.exe 28 PID 1532 wrote to memory of 1332 1532 Rundll32.exe 28 PID 1532 wrote to memory of 672 1532 Rundll32.exe 31 PID 1532 wrote to memory of 672 1532 Rundll32.exe 31 PID 1532 wrote to memory of 672 1532 Rundll32.exe 31 PID 1532 wrote to memory of 672 1532 Rundll32.exe 31 PID 1532 wrote to memory of 1344 1532 Rundll32.exe 32 PID 1532 wrote to memory of 1344 1532 Rundll32.exe 32 PID 1532 wrote to memory of 1344 1532 Rundll32.exe 32 PID 1532 wrote to memory of 1344 1532 Rundll32.exe 32 PID 1532 wrote to memory of 1692 1532 Rundll32.exe 34 PID 1532 wrote to memory of 1692 1532 Rundll32.exe 34 PID 1532 wrote to memory of 1692 1532 Rundll32.exe 34 PID 1532 wrote to memory of 1692 1532 Rundll32.exe 34 PID 1332 wrote to memory of 1732 1332 net.exe 36 PID 1332 wrote to memory of 1732 1332 net.exe 36 PID 1332 wrote to memory of 1732 1332 net.exe 36 PID 1332 wrote to memory of 1732 1332 net.exe 36 PID 672 wrote to memory of 1980 672 net.exe 35 PID 672 wrote to memory of 1980 672 net.exe 35 PID 672 wrote to memory of 1980 672 net.exe 35 PID 672 wrote to memory of 1980 672 net.exe 35 PID 1532 wrote to memory of 944 1532 Rundll32.exe 38 PID 1532 wrote to memory of 944 1532 Rundll32.exe 38 PID 1532 wrote to memory of 944 1532 Rundll32.exe 38 PID 1532 wrote to memory of 944 1532 Rundll32.exe 38 PID 1460 wrote to memory of 1100 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 40 PID 1460 wrote to memory of 1100 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 40 PID 1460 wrote to memory of 1100 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 40 PID 1460 wrote to memory of 1100 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 40 PID 1460 wrote to memory of 1100 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 40 PID 1460 wrote to memory of 1100 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 40 PID 1460 wrote to memory of 1100 1460 3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe"C:\Users\Admin\AppData\Local\Temp\3e0bd8535575f51dc788111893abfb7633dcb6d77deaba649bf656c7ac0008a9.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\tnifmw.dll Exucute2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:1732
-
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:1980
-
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:1344
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop PolicyAgent3⤵
- Launches sc.exe
PID:944
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\wlfknw.dll Exucute2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5210995930b8b604e08ffa28b72be5cf6
SHA11f3a6bd70c7f5f51c56ce2cdedef93b37d3cc6fe
SHA256f342192c746fdcb95168042d02f9f6d1e3a69633baa0ff58ad23e13b15be60ce
SHA512e01cf7c25cd70878986de4e17e67df25430d07d7f91b7b8e8e042c8645e5bf944c8e8d22384038b4a08b1a53d95cfd05c3a95860e15670d42f9d79533eaa2711
-
Filesize
19KB
MD5969035e2164bd07b46d7b35ea766f47d
SHA1d1ae955cf7524d1d0d2af10be7cc63649e7bc520
SHA2562bf16a3299ac282671c61c6d332f5680cf5dae9af499c513f4c9d07cd3a1c674
SHA512160c91355fcd55d581748efa243ad374e00f85f39d98afce494bd13312ded6d6e2c2924e3bbd223e438a517eac7e8cc7ddab144fa76faf3765c7c07c5c777c53
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6
-
Filesize
53KB
MD5210995930b8b604e08ffa28b72be5cf6
SHA11f3a6bd70c7f5f51c56ce2cdedef93b37d3cc6fe
SHA256f342192c746fdcb95168042d02f9f6d1e3a69633baa0ff58ad23e13b15be60ce
SHA512e01cf7c25cd70878986de4e17e67df25430d07d7f91b7b8e8e042c8645e5bf944c8e8d22384038b4a08b1a53d95cfd05c3a95860e15670d42f9d79533eaa2711
-
Filesize
53KB
MD5210995930b8b604e08ffa28b72be5cf6
SHA11f3a6bd70c7f5f51c56ce2cdedef93b37d3cc6fe
SHA256f342192c746fdcb95168042d02f9f6d1e3a69633baa0ff58ad23e13b15be60ce
SHA512e01cf7c25cd70878986de4e17e67df25430d07d7f91b7b8e8e042c8645e5bf944c8e8d22384038b4a08b1a53d95cfd05c3a95860e15670d42f9d79533eaa2711
-
Filesize
53KB
MD5210995930b8b604e08ffa28b72be5cf6
SHA11f3a6bd70c7f5f51c56ce2cdedef93b37d3cc6fe
SHA256f342192c746fdcb95168042d02f9f6d1e3a69633baa0ff58ad23e13b15be60ce
SHA512e01cf7c25cd70878986de4e17e67df25430d07d7f91b7b8e8e042c8645e5bf944c8e8d22384038b4a08b1a53d95cfd05c3a95860e15670d42f9d79533eaa2711
-
Filesize
53KB
MD5210995930b8b604e08ffa28b72be5cf6
SHA11f3a6bd70c7f5f51c56ce2cdedef93b37d3cc6fe
SHA256f342192c746fdcb95168042d02f9f6d1e3a69633baa0ff58ad23e13b15be60ce
SHA512e01cf7c25cd70878986de4e17e67df25430d07d7f91b7b8e8e042c8645e5bf944c8e8d22384038b4a08b1a53d95cfd05c3a95860e15670d42f9d79533eaa2711
-
Filesize
19KB
MD5969035e2164bd07b46d7b35ea766f47d
SHA1d1ae955cf7524d1d0d2af10be7cc63649e7bc520
SHA2562bf16a3299ac282671c61c6d332f5680cf5dae9af499c513f4c9d07cd3a1c674
SHA512160c91355fcd55d581748efa243ad374e00f85f39d98afce494bd13312ded6d6e2c2924e3bbd223e438a517eac7e8cc7ddab144fa76faf3765c7c07c5c777c53
-
Filesize
19KB
MD5969035e2164bd07b46d7b35ea766f47d
SHA1d1ae955cf7524d1d0d2af10be7cc63649e7bc520
SHA2562bf16a3299ac282671c61c6d332f5680cf5dae9af499c513f4c9d07cd3a1c674
SHA512160c91355fcd55d581748efa243ad374e00f85f39d98afce494bd13312ded6d6e2c2924e3bbd223e438a517eac7e8cc7ddab144fa76faf3765c7c07c5c777c53
-
Filesize
19KB
MD5969035e2164bd07b46d7b35ea766f47d
SHA1d1ae955cf7524d1d0d2af10be7cc63649e7bc520
SHA2562bf16a3299ac282671c61c6d332f5680cf5dae9af499c513f4c9d07cd3a1c674
SHA512160c91355fcd55d581748efa243ad374e00f85f39d98afce494bd13312ded6d6e2c2924e3bbd223e438a517eac7e8cc7ddab144fa76faf3765c7c07c5c777c53
-
Filesize
19KB
MD5969035e2164bd07b46d7b35ea766f47d
SHA1d1ae955cf7524d1d0d2af10be7cc63649e7bc520
SHA2562bf16a3299ac282671c61c6d332f5680cf5dae9af499c513f4c9d07cd3a1c674
SHA512160c91355fcd55d581748efa243ad374e00f85f39d98afce494bd13312ded6d6e2c2924e3bbd223e438a517eac7e8cc7ddab144fa76faf3765c7c07c5c777c53