Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 13:13
Behavioral task
behavioral1
Sample
58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe
Resource
win7-20220812-en
General
-
Target
58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe
-
Size
298KB
-
MD5
13066e92e8a49557d4a31b2d99735ba2
-
SHA1
9bbfb875199972c7aca96d01be629f38533b0657
-
SHA256
58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b
-
SHA512
016b1b6b5dfbdaf166fbb9ea6802c44bf81f1f838ae0fb35150b073d023961e8bca1e81cfea42e20b6dbf292673e9b35b2b06d17fad4258ef0d1870153f8f09d
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYw:v6Wq4aaE6KwyF5L0Y2D1PqLX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 1768 svhost.exe -
resource yara_rule behavioral1/memory/1696-55-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/files/0x00140000000054ab-57.dat upx behavioral1/files/0x00140000000054ab-59.dat upx behavioral1/memory/1768-61-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1696-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1768-63-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\z: svhost.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1768-61-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1696-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1768-63-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe 1768 svhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1768 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 27 PID 1696 wrote to memory of 1768 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 27 PID 1696 wrote to memory of 1768 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 27 PID 1696 wrote to memory of 1768 1696 58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe"C:\Users\Admin\AppData\Local\Temp\58b5c6c25f75e4fa1058eae2973b621a18969ee40badb4c2529cf88339a5da9b.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD519d929214e247902ca8e5b86e8caef66
SHA13da9958ad834eb5b0bc6874c739faf4949d919a1
SHA2561e617bc5828a574c36b46597dfb79b5c3e67bf197dee07c0e0624ab4fc6faab1
SHA512f657eb0485ff4b59a04ce227176177c8bd0292a21e30c048edb1de2f306911485b23e2020d9bb01847a8aa78eb54ea506b14737e3fccb768b715f1e8a6686c04
-
Filesize
298KB
MD519d929214e247902ca8e5b86e8caef66
SHA13da9958ad834eb5b0bc6874c739faf4949d919a1
SHA2561e617bc5828a574c36b46597dfb79b5c3e67bf197dee07c0e0624ab4fc6faab1
SHA512f657eb0485ff4b59a04ce227176177c8bd0292a21e30c048edb1de2f306911485b23e2020d9bb01847a8aa78eb54ea506b14737e3fccb768b715f1e8a6686c04