Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 00:25

General

  • Target

    c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe

  • Size

    156KB

  • MD5

    717e66cbcda10e096555e02a8dda1022

  • SHA1

    230e6d6d26f8da94e4a0004543edcbc4f6139973

  • SHA256

    c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b

  • SHA512

    6c9d23ab59b93dd00d0b77a2f23b44a10ebde17fac6ea0cb063dc64ecb75c319d4030b39b60fa09f1e66af70c0619974b8fe94d17091cfee4c8bd2b420d671ca

  • SSDEEP

    3072:MBd1BE2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANAKE5j4oQHZ:OdDE2R7Qvb4tQTaCeFP4ACd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe
    "C:\Users\Admin\AppData\Local\Temp\c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\giuuge.exe
      "C:\Users\Admin\giuuge.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\giuuge.exe

    Filesize

    156KB

    MD5

    bde3bd7aac826e296430f87e7a6e762a

    SHA1

    fbd918cb5e9109736ae93dd760ae9b9800f4f1a3

    SHA256

    86622c07376c26c79cc3aac159bd0f892151fd428cd69e6291ca07487031b5b3

    SHA512

    8f8fd3230b15176240e8e45320c12532bb0c9cdcb976777e31a5dcc01af161013ec6f475ce337bcfff77dc1ce198de3164e3bd09aec2d632cfea20bc571d7f7e

  • C:\Users\Admin\giuuge.exe

    Filesize

    156KB

    MD5

    bde3bd7aac826e296430f87e7a6e762a

    SHA1

    fbd918cb5e9109736ae93dd760ae9b9800f4f1a3

    SHA256

    86622c07376c26c79cc3aac159bd0f892151fd428cd69e6291ca07487031b5b3

    SHA512

    8f8fd3230b15176240e8e45320c12532bb0c9cdcb976777e31a5dcc01af161013ec6f475ce337bcfff77dc1ce198de3164e3bd09aec2d632cfea20bc571d7f7e

  • \Users\Admin\giuuge.exe

    Filesize

    156KB

    MD5

    bde3bd7aac826e296430f87e7a6e762a

    SHA1

    fbd918cb5e9109736ae93dd760ae9b9800f4f1a3

    SHA256

    86622c07376c26c79cc3aac159bd0f892151fd428cd69e6291ca07487031b5b3

    SHA512

    8f8fd3230b15176240e8e45320c12532bb0c9cdcb976777e31a5dcc01af161013ec6f475ce337bcfff77dc1ce198de3164e3bd09aec2d632cfea20bc571d7f7e

  • \Users\Admin\giuuge.exe

    Filesize

    156KB

    MD5

    bde3bd7aac826e296430f87e7a6e762a

    SHA1

    fbd918cb5e9109736ae93dd760ae9b9800f4f1a3

    SHA256

    86622c07376c26c79cc3aac159bd0f892151fd428cd69e6291ca07487031b5b3

    SHA512

    8f8fd3230b15176240e8e45320c12532bb0c9cdcb976777e31a5dcc01af161013ec6f475ce337bcfff77dc1ce198de3164e3bd09aec2d632cfea20bc571d7f7e

  • memory/2036-56-0x0000000075C61000-0x0000000075C63000-memory.dmp

    Filesize

    8KB