Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 06:44

General

  • Target

    73043e50ea3214c7efef0d58cfdace6a80fc4e2ef604201afb00fa1078c8b1fe.exe

  • Size

    156KB

  • MD5

    67b9e5cc88def4a5fe8969dc2e57c760

  • SHA1

    647614d75cfc68e398765dc0e079b6f09158159c

  • SHA256

    73043e50ea3214c7efef0d58cfdace6a80fc4e2ef604201afb00fa1078c8b1fe

  • SHA512

    7b6418764d271b129177799970637cea7c4f6d3355521e5732361c25a82a0edc546c184edd2fdc25b322b6315fb2fc98aac5a1f5a189d097a8b0e9c7212aa778

  • SSDEEP

    1536:wCkumpuY0UBU8gRDGHPOGMmUbaxGAka+t/K9rCGaV9mw7Jqx8M+dzAb2QgRVt:UpuY0ya4UbaxqkCGaVD7JqfKAbHot

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73043e50ea3214c7efef0d58cfdace6a80fc4e2ef604201afb00fa1078c8b1fe.exe
    "C:\Users\Admin\AppData\Local\Temp\73043e50ea3214c7efef0d58cfdace6a80fc4e2ef604201afb00fa1078c8b1fe.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\xuovuil.exe
      "C:\Users\Admin\xuovuil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xuovuil.exe

    Filesize

    156KB

    MD5

    c144f7504e9cf7e4cddc8d3942079a6f

    SHA1

    e90e5f2326551c45f4a2be27dc8da4fbbd941b16

    SHA256

    fdc5920eec657b285895c4a086e24af5cb279b1f6f6bada3fd219d7b5b338289

    SHA512

    123c64d7c5590c3171ae21bf413650d114c27e730c8b9021844cfba5969b566ee35b86cd76d18546ca91e6240c0f38f63f584ef1bc066fd5c52aa31bd2fc5ced

  • C:\Users\Admin\xuovuil.exe

    Filesize

    156KB

    MD5

    c144f7504e9cf7e4cddc8d3942079a6f

    SHA1

    e90e5f2326551c45f4a2be27dc8da4fbbd941b16

    SHA256

    fdc5920eec657b285895c4a086e24af5cb279b1f6f6bada3fd219d7b5b338289

    SHA512

    123c64d7c5590c3171ae21bf413650d114c27e730c8b9021844cfba5969b566ee35b86cd76d18546ca91e6240c0f38f63f584ef1bc066fd5c52aa31bd2fc5ced

  • \Users\Admin\xuovuil.exe

    Filesize

    156KB

    MD5

    c144f7504e9cf7e4cddc8d3942079a6f

    SHA1

    e90e5f2326551c45f4a2be27dc8da4fbbd941b16

    SHA256

    fdc5920eec657b285895c4a086e24af5cb279b1f6f6bada3fd219d7b5b338289

    SHA512

    123c64d7c5590c3171ae21bf413650d114c27e730c8b9021844cfba5969b566ee35b86cd76d18546ca91e6240c0f38f63f584ef1bc066fd5c52aa31bd2fc5ced

  • \Users\Admin\xuovuil.exe

    Filesize

    156KB

    MD5

    c144f7504e9cf7e4cddc8d3942079a6f

    SHA1

    e90e5f2326551c45f4a2be27dc8da4fbbd941b16

    SHA256

    fdc5920eec657b285895c4a086e24af5cb279b1f6f6bada3fd219d7b5b338289

    SHA512

    123c64d7c5590c3171ae21bf413650d114c27e730c8b9021844cfba5969b566ee35b86cd76d18546ca91e6240c0f38f63f584ef1bc066fd5c52aa31bd2fc5ced

  • memory/620-56-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB