Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    25s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 09:04

General

  • Target

    c6c44e700e1598be12075b5b95e43bc0dd8ee1de715d8ace0092aa8dedee947d.exe

  • Size

    117KB

  • MD5

    7b6a3a4d9741b8474966d7c84f688426

  • SHA1

    8fd8ca298eea243aa9d9e9d1efa374382402d376

  • SHA256

    c6c44e700e1598be12075b5b95e43bc0dd8ee1de715d8ace0092aa8dedee947d

  • SHA512

    d8b3078b2ec668a14585f9b3b42619aad01eb8143d128e2bdf2b6a48050e586a26b0318ed6938e162a493633d0d3b83a7d749c8dbe5160af5bff34b6ef62f212

  • SSDEEP

    1536:lRf1o2Ca7qiagSshdS0D6mJmioSC2qAaOKdACYIZYIJp9ufYBGGoX8bxRiff24N0:lpj7EUbD6mJjoOjKCanBYg3ifNSXnJLL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6c44e700e1598be12075b5b95e43bc0dd8ee1de715d8ace0092aa8dedee947d.exe
    "C:\Users\Admin\AppData\Local\Temp\c6c44e700e1598be12075b5b95e43bc0dd8ee1de715d8ace0092aa8dedee947d.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nst33A0.tmp\System.dll

    Filesize

    10KB

    MD5

    bf01b2d04e8fad306ba2f364cfc4edfa

    SHA1

    58f42b45ca9fc1818c4498ecd8bac088d20f2b18

    SHA256

    d3f9c99e0c1c9acd81a1b33bc3dbd305140def90d10485c253cf1d455f0dc903

    SHA512

    30ca1663d659c5efac7fed3d1aaba81c47d5d5fda77f30f021124c882b858732e17f917bfd0aa3ee7b269fad86e75b1b9388d8f916e7a4e2c9961669f2c772e7

  • \Windows\SysWOW64\CMVideo.dll

    Filesize

    148KB

    MD5

    32e1c38cb1bb5660d5d6a4b12b2aee6f

    SHA1

    f3f5970dc75219bb661545c130152ade7ad9a779

    SHA256

    de6487ab969d931238db7f8fac9b1c6d481e40fb4e5b181b81eb8a0d400a9c4b

    SHA512

    b0b9127e9938a790619e406c58a16ead161c43a36babd699e237e1c23aa575d8cb28bf623d724464abc2000e3c2823d5f3733c1c9768eb99c1452af31017592b

  • \Windows\SysWOW64\CMVideo.dll

    Filesize

    148KB

    MD5

    32e1c38cb1bb5660d5d6a4b12b2aee6f

    SHA1

    f3f5970dc75219bb661545c130152ade7ad9a779

    SHA256

    de6487ab969d931238db7f8fac9b1c6d481e40fb4e5b181b81eb8a0d400a9c4b

    SHA512

    b0b9127e9938a790619e406c58a16ead161c43a36babd699e237e1c23aa575d8cb28bf623d724464abc2000e3c2823d5f3733c1c9768eb99c1452af31017592b

  • memory/1852-54-0x0000000075521000-0x0000000075523000-memory.dmp

    Filesize

    8KB