Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe
Resource
win10v2004-20220901-en
General
-
Target
8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe
-
Size
1.2MB
-
MD5
41519a90fac57bd8783c09187a127607
-
SHA1
2bb72ccb4cd8de1780c62efada6b6b17f6a77e97
-
SHA256
8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d
-
SHA512
b6cf21bd04a1ba0e5ceb6fcfcc7f4b19a3552d48d617d461b0b4791bf35d63f2c2028c82b3840bb77a47d7032ea09220c7303816b3c4e4612ecea58c7e8efde5
-
SSDEEP
24576:h85OMvYfGUbcOgUrBCm9ZkIFPpqMZRGrUN8Gy4cJJnMLXqXvRqjO3:6ObFP8MZpjiM7qY0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1320 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr 1752 tmp2.exe -
Loads dropped DLL 5 IoCs
pid Process 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 1244 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ODB = "regsvr32 /s \"C:\\Users\\Admin\\AppData\\Roaming\\officedb\\officeDB.dll\"" tmp2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1320 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr 1320 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr 1320 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr 1752 tmp2.exe 1752 tmp2.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 360 wrote to memory of 1320 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 27 PID 360 wrote to memory of 1320 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 27 PID 360 wrote to memory of 1320 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 27 PID 360 wrote to memory of 1320 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 27 PID 360 wrote to memory of 1752 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 28 PID 360 wrote to memory of 1752 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 28 PID 360 wrote to memory of 1752 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 28 PID 360 wrote to memory of 1752 360 8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe 28 PID 1752 wrote to memory of 1244 1752 tmp2.exe 29 PID 1752 wrote to memory of 1244 1752 tmp2.exe 29 PID 1752 wrote to memory of 1244 1752 tmp2.exe 29 PID 1752 wrote to memory of 1244 1752 tmp2.exe 29 PID 1752 wrote to memory of 1244 1752 tmp2.exe 29 PID 1752 wrote to memory of 1244 1752 tmp2.exe 29 PID 1752 wrote to memory of 1244 1752 tmp2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe"C:\Users\Admin\AppData\Local\Temp\8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr"C:\Users\Admin\AppData\Local\Temp\8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr" /S2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\tmp2.exeC:\Users\Admin\AppData\Local\Temp\tmp2.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Roaming\officedb\officeDB.dll"3⤵
- Loads dropped DLL
PID:1244
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr
Filesize828KB
MD581c6c0f999d39286079ec6eea5b788b7
SHA1a6f8d57292c42fdca19cdfabdc1b3e64c2a66373
SHA2560987ba224bdfc0e15d9474a2df8a327fff0a7eba404fce1f5cd5372f5c2552c9
SHA512c072c8bbc53a25a79c9940d890950f7eb8241cf780cb0a48764dc79d3dc4fa85fa13de89ce5aac1a697083c97ce966e973e15f0aeaca19904162105456529484
-
Filesize
364KB
MD54e296586a1f5f6bcc01f8ace32715e6d
SHA1cd0927d7fcb9765e6a5845b15bb3708a3a9b000a
SHA2562d37480922e6fd894a4bd535190be297673ac7b89e6e36cf0543816a9e629898
SHA51269f06cf00b38cb9dc4edcdddaa9f711684e78f1af313c2b7511d8d5983f741cd4919701e0db4ea74a53f744f328591014063cf00de7be65fc6293eabab3f9e56
-
Filesize
364KB
MD54e296586a1f5f6bcc01f8ace32715e6d
SHA1cd0927d7fcb9765e6a5845b15bb3708a3a9b000a
SHA2562d37480922e6fd894a4bd535190be297673ac7b89e6e36cf0543816a9e629898
SHA51269f06cf00b38cb9dc4edcdddaa9f711684e78f1af313c2b7511d8d5983f741cd4919701e0db4ea74a53f744f328591014063cf00de7be65fc6293eabab3f9e56
-
Filesize
104KB
MD537ee769d5c39d3f6cd9c8506e0ba9353
SHA1beb2c5974393990ce5d42045a0f958fd7122e9a4
SHA25614fe68c477fa6c02fe1328dfefc93ded488aa31ad5765c7be339cb83b537587a
SHA5127461c6c709cf23946ee0b218c9f4c7b1e2892c0661e53137c03e5d274d8bf848584736f28fd00dce7196a9e29671098a7af0ef1a55f4b040ed7cee18dbe684ab
-
\Users\Admin\AppData\Local\Temp\8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr
Filesize828KB
MD581c6c0f999d39286079ec6eea5b788b7
SHA1a6f8d57292c42fdca19cdfabdc1b3e64c2a66373
SHA2560987ba224bdfc0e15d9474a2df8a327fff0a7eba404fce1f5cd5372f5c2552c9
SHA512c072c8bbc53a25a79c9940d890950f7eb8241cf780cb0a48764dc79d3dc4fa85fa13de89ce5aac1a697083c97ce966e973e15f0aeaca19904162105456529484
-
\Users\Admin\AppData\Local\Temp\8f39e6130a2b8934e45c8d55a7c7755abe7f9f149b296921c28eed0ddc27c11d.scr
Filesize828KB
MD581c6c0f999d39286079ec6eea5b788b7
SHA1a6f8d57292c42fdca19cdfabdc1b3e64c2a66373
SHA2560987ba224bdfc0e15d9474a2df8a327fff0a7eba404fce1f5cd5372f5c2552c9
SHA512c072c8bbc53a25a79c9940d890950f7eb8241cf780cb0a48764dc79d3dc4fa85fa13de89ce5aac1a697083c97ce966e973e15f0aeaca19904162105456529484
-
Filesize
364KB
MD54e296586a1f5f6bcc01f8ace32715e6d
SHA1cd0927d7fcb9765e6a5845b15bb3708a3a9b000a
SHA2562d37480922e6fd894a4bd535190be297673ac7b89e6e36cf0543816a9e629898
SHA51269f06cf00b38cb9dc4edcdddaa9f711684e78f1af313c2b7511d8d5983f741cd4919701e0db4ea74a53f744f328591014063cf00de7be65fc6293eabab3f9e56
-
Filesize
364KB
MD54e296586a1f5f6bcc01f8ace32715e6d
SHA1cd0927d7fcb9765e6a5845b15bb3708a3a9b000a
SHA2562d37480922e6fd894a4bd535190be297673ac7b89e6e36cf0543816a9e629898
SHA51269f06cf00b38cb9dc4edcdddaa9f711684e78f1af313c2b7511d8d5983f741cd4919701e0db4ea74a53f744f328591014063cf00de7be65fc6293eabab3f9e56
-
Filesize
104KB
MD537ee769d5c39d3f6cd9c8506e0ba9353
SHA1beb2c5974393990ce5d42045a0f958fd7122e9a4
SHA25614fe68c477fa6c02fe1328dfefc93ded488aa31ad5765c7be339cb83b537587a
SHA5127461c6c709cf23946ee0b218c9f4c7b1e2892c0661e53137c03e5d274d8bf848584736f28fd00dce7196a9e29671098a7af0ef1a55f4b040ed7cee18dbe684ab