Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 13:49

General

  • Target

    73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe

  • Size

    883KB

  • MD5

    2b24b08789ff8a55624bfbadddd24ad1

  • SHA1

    80c61f3961fd54d28db7a44d92715a4bac3dd83d

  • SHA256

    73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6

  • SHA512

    479b4f74a4d3e76759f394c2ee9fce2f0de4c33ef84bfa6f07d61ca735b015e1c10d2842c3bbc743cd585bf0cebed3cb4b12c8a7683fb0328e92b01f76661ca6

  • SSDEEP

    24576:4ynccYTstXyiHwtB1H6ti/PNJ4piHwtB1H6ti/PNJ4C:4yrPyiHwei/PApiHwei/PAC

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe
    "C:\Users\Admin\AppData\Local\Temp\73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe
      C:\Users\Admin\AppData\Local\Temp\73e92da6c71a04784a80a0415b4f85eb739e1d36f9978b5bb78ec7bf951038a6.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1016
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C START "" "C:\Users\Admin\AppData\Local\Temp\\2009_9_29_0.31.23.jpg"
      2⤵
        PID:976
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2009_9_29_0.31.23.jpg

      Filesize

      293KB

      MD5

      939303b5327f87a030d22d666039394b

      SHA1

      d358e082096b54a37df5eb30e5299722e3431848

      SHA256

      c5573d032fca6dd24be668ef7e4708b9d160d7a63a2450f6ae38eb53ced71814

      SHA512

      547c040625f6cfc51a1354b50cf54a1ecbf3c6d8fe07c71fa39aee39e62f327e38bc9b687db0490ba255dfe0a0e70578464992459d8f8a4c9dbc22bb66832bf0

    • memory/1016-56-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1016-57-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1016-59-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1016-61-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1016-70-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1016-73-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1948-64-0x0000000075F51000-0x0000000075F53000-memory.dmp

      Filesize

      8KB

    • memory/1948-67-0x00000000027B0000-0x000000000326A000-memory.dmp

      Filesize

      10.7MB