Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 07:14

General

  • Target

    7fa870371364123e05201c77e00d931d25f87dc127dfeff90adb152ebe8f5616.exe

  • Size

    376KB

  • MD5

    6eed63edacd4d685bbef8c719d8ec140

  • SHA1

    cbb3187c53b254d105de3a0550cab149435392bc

  • SHA256

    7fa870371364123e05201c77e00d931d25f87dc127dfeff90adb152ebe8f5616

  • SHA512

    64079d9605f6861a61040a630776f2f1fbd4822eb3e68c61cdf03a03a6dc2676df16245913022759a70e7c197f6f52032a444f58abf66706dbd0fd88de3e17b0

  • SSDEEP

    6144:NECmVYD3gkWi9BaAbHOVSL7Qm61FC84m2YlK:0VYTwi9cAiSLT61wQs

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fa870371364123e05201c77e00d931d25f87dc127dfeff90adb152ebe8f5616.exe
    "C:\Users\Admin\AppData\Local\Temp\7fa870371364123e05201c77e00d931d25f87dc127dfeff90adb152ebe8f5616.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\naaobuz.exe
      "C:\Users\Admin\naaobuz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\naaobuz.exe

    Filesize

    376KB

    MD5

    a3b62dd66978616e32f5b0ae646f93b0

    SHA1

    c82bd607664b58dcbd18a8b5f3b2da35910e65f6

    SHA256

    848ae6dfb5fd2eebdd5e24149f68eb66047cb93fdda8ee91092676127b3f3329

    SHA512

    ec675a608b0cee22f050671684ab988350d0f2edea02058320db487043c71511abfd113570373427419943e3c2e65631be45f4d66ff2cde9d2e4ce8768471dcb

  • C:\Users\Admin\naaobuz.exe

    Filesize

    376KB

    MD5

    a3b62dd66978616e32f5b0ae646f93b0

    SHA1

    c82bd607664b58dcbd18a8b5f3b2da35910e65f6

    SHA256

    848ae6dfb5fd2eebdd5e24149f68eb66047cb93fdda8ee91092676127b3f3329

    SHA512

    ec675a608b0cee22f050671684ab988350d0f2edea02058320db487043c71511abfd113570373427419943e3c2e65631be45f4d66ff2cde9d2e4ce8768471dcb

  • \Users\Admin\naaobuz.exe

    Filesize

    376KB

    MD5

    a3b62dd66978616e32f5b0ae646f93b0

    SHA1

    c82bd607664b58dcbd18a8b5f3b2da35910e65f6

    SHA256

    848ae6dfb5fd2eebdd5e24149f68eb66047cb93fdda8ee91092676127b3f3329

    SHA512

    ec675a608b0cee22f050671684ab988350d0f2edea02058320db487043c71511abfd113570373427419943e3c2e65631be45f4d66ff2cde9d2e4ce8768471dcb

  • \Users\Admin\naaobuz.exe

    Filesize

    376KB

    MD5

    a3b62dd66978616e32f5b0ae646f93b0

    SHA1

    c82bd607664b58dcbd18a8b5f3b2da35910e65f6

    SHA256

    848ae6dfb5fd2eebdd5e24149f68eb66047cb93fdda8ee91092676127b3f3329

    SHA512

    ec675a608b0cee22f050671684ab988350d0f2edea02058320db487043c71511abfd113570373427419943e3c2e65631be45f4d66ff2cde9d2e4ce8768471dcb

  • memory/948-67-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/948-71-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1184-56-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1184-57-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB

  • memory/1184-65-0x0000000002C80000-0x0000000002CDF000-memory.dmp

    Filesize

    380KB

  • memory/1184-66-0x0000000002C80000-0x0000000002CDF000-memory.dmp

    Filesize

    380KB

  • memory/1184-69-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1184-70-0x0000000002C80000-0x0000000002CDF000-memory.dmp

    Filesize

    380KB