Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 21:43

General

  • Target

    3622aaa168be721c29dd27f8d8438f0801fcb26a1c83861e91fed729582dc530.exe

  • Size

    12.3MB

  • MD5

    539f578b64798adbc2e7fd533ab5f3df

  • SHA1

    584787deede001f3ea3de929fa179dc0d1779e16

  • SHA256

    3622aaa168be721c29dd27f8d8438f0801fcb26a1c83861e91fed729582dc530

  • SHA512

    388f9930653152fc7108ef842782355188415069737287c9a8bff4f595da6cd112ef3c471cd44f1463be3d8edddcdb6868a99743ca72775cd921cdd643e7dceb

  • SSDEEP

    196608:dog5iYnsuJhm2ftgF2X+AsIBDcNQlKnLGWcNNsQb2xd9fY61bHEoQebtG:dog5iYnsuzm217hALGWONsQiLlOeU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3622aaa168be721c29dd27f8d8438f0801fcb26a1c83861e91fed729582dc530.exe
    "C:\Users\Admin\AppData\Local\Temp\3622aaa168be721c29dd27f8d8438f0801fcb26a1c83861e91fed729582dc530.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c .\Setup.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\WINDOWS\SysWOW64\msiexec.exe
        C:\WINDOWS\system32\msiexec.exe /x {0F42CE41-25C8-43E8-878E-61C5D0B1BB00} /quiet
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:304
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\7zSB2AD.tmp\GeitRADllCom.msi" /passive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:892
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:732
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zSB2AD.tmp\GeitRADllCom.msi

      Filesize

      10.6MB

      MD5

      ed46088ab1bab6ceffe89cc640419cd6

      SHA1

      57f0157430f30fc6acad4e8c910315baa6aef9b6

      SHA256

      a3b3ce84787711f2614703957bcdc1e2b830246be192f004c0b9afea02ff0061

      SHA512

      90dff963460082bfcb91f091c2f9643073ac224a89538b5388f3a586bbae1b3dda4890c9734b92b23ed5308ce1291dd553a8403994c4fccddad7408938d48c3b

    • C:\Users\Admin\AppData\Local\Temp\7zSB2AD.tmp\setup.bat

      Filesize

      644B

      MD5

      42b2c59f4007d67d69fc0564177b4867

      SHA1

      9f03b8eee97fa731d3e34c418f3af744f8904e56

      SHA256

      088d445aca4a3cfa757ebdf273fa959afca86cd5587c45ebddea4c4bd6a8531e

      SHA512

      77cdd2eb002ab065716c94067ebfc17f42cb37811df46c5e4ed53d5e0a87979c72c9c3d48a2e5096ad4893b2ae1e187e3e97e1c6798b0179e7643f01b20f5f98

    • memory/732-60-0x000007FEFBAE1000-0x000007FEFBAE3000-memory.dmp

      Filesize

      8KB

    • memory/1344-54-0x0000000074F41000-0x0000000074F43000-memory.dmp

      Filesize

      8KB