Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 13:11
Behavioral task
behavioral1
Sample
00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe
Resource
win7-20220901-en
General
-
Target
00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe
-
Size
298KB
-
MD5
de3e9d2d4a4ca61d1a0d670bb9d1be3f
-
SHA1
63118fde278e50abec0b55721ed344245dc2512d
-
SHA256
00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b
-
SHA512
c418587f5e1c3b9968487ceb01a1406344449502483bee54d477aa64ffa477c530ce83f9ebc34a416f1117b1a4adb29265fd6f403b4b263e91d1af5be0a54ae8
-
SSDEEP
6144:tuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIY4:A6Wq4aaE6KwyF5L0Y2D1PqLb
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1116 svhost.exe 1932 svhost.exe -
resource yara_rule behavioral1/files/0x0008000000005c51-56.dat upx behavioral1/files/0x0008000000005c51-58.dat upx behavioral1/files/0x0008000000005c51-60.dat upx behavioral1/memory/1464-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1116-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1932-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1464-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1116-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1932-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\h: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1464-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1116-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1932-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1464-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1116-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1932-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1116 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1932 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1932 svhost.exe 1116 svhost.exe 1116 svhost.exe 1932 svhost.exe 1116 svhost.exe 1932 svhost.exe 1116 svhost.exe 1116 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1116 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1116 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1932 svhost.exe 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 1116 svhost.exe 1932 svhost.exe 1932 svhost.exe 1116 svhost.exe 1116 svhost.exe 1932 svhost.exe 1116 svhost.exe 1932 svhost.exe 1116 svhost.exe 1116 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe 1932 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1116 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 27 PID 1464 wrote to memory of 1116 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 27 PID 1464 wrote to memory of 1116 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 27 PID 1464 wrote to memory of 1116 1464 00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe 27 PID 1116 wrote to memory of 1932 1116 svhost.exe 28 PID 1116 wrote to memory of 1932 1116 svhost.exe 28 PID 1116 wrote to memory of 1932 1116 svhost.exe 28 PID 1116 wrote to memory of 1932 1116 svhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe"C:\Users\Admin\AppData\Local\Temp\00805451a8d49679b989269df9172452f497f967cb904c2b4758825dcef24f8b.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5005fd26d9bfdc2a614d06fd3a20917c0
SHA13fa6221652ae6407f8f0ffb6cc8829748e284779
SHA256a9fd79c95ac3931e59bab5c172655028aa83cb8a5e1dae256e4eab162d4f2872
SHA512287a3c733145696417366eaf7fab7d1120e5eda6fb3809d7765e6f846870a679a0e6a16770efd8dca0d21e716b4eff6a0884ad79101ac5d070ee30d4231067a7
-
Filesize
298KB
MD5005fd26d9bfdc2a614d06fd3a20917c0
SHA13fa6221652ae6407f8f0ffb6cc8829748e284779
SHA256a9fd79c95ac3931e59bab5c172655028aa83cb8a5e1dae256e4eab162d4f2872
SHA512287a3c733145696417366eaf7fab7d1120e5eda6fb3809d7765e6f846870a679a0e6a16770efd8dca0d21e716b4eff6a0884ad79101ac5d070ee30d4231067a7
-
Filesize
298KB
MD5005fd26d9bfdc2a614d06fd3a20917c0
SHA13fa6221652ae6407f8f0ffb6cc8829748e284779
SHA256a9fd79c95ac3931e59bab5c172655028aa83cb8a5e1dae256e4eab162d4f2872
SHA512287a3c733145696417366eaf7fab7d1120e5eda6fb3809d7765e6f846870a679a0e6a16770efd8dca0d21e716b4eff6a0884ad79101ac5d070ee30d4231067a7