Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe
Resource
win10v2004-20220812-en
General
-
Target
e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe
-
Size
17KB
-
MD5
70bc7465bca83546f84e42f9b6609fe0
-
SHA1
7d29645c17348a14c2b4367b375b61a29e25e52a
-
SHA256
e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc
-
SHA512
be34ef94796a2e1eef27ba48af40790f73d58aa999ed4a986f961ec7dad403593e25a31639e12b726b59bfdc100838e6cc73e7ca09972f9e3db0f8555e941213
-
SSDEEP
384:224bhc6Q1NFMJ70QHgZlOADKni0nhftDZnxRq4BUC2UVQu:llLF070Q8IniQlDRzq6UC2Vu
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run ishost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\ishost.exe = "ishost.exe" ishost.exe -
Executes dropped EXE 2 IoCs
pid Process 916 ishost.exe 1560 ismini.exe -
Deletes itself 1 IoCs
pid Process 1412 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 916 ishost.exe 916 ishost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ishost.exe e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe File opened for modification C:\Windows\SysWOW64\ishost.exe e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe File created C:\Windows\SysWOW64\ismini.exe ishost.exe File created C:\Windows\SysWOW64\components\flx0.dll ishost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 916 ishost.exe 916 ishost.exe 1560 ismini.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe 1560 ismini.exe 916 ishost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2000 wrote to memory of 916 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 27 PID 2000 wrote to memory of 916 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 27 PID 2000 wrote to memory of 916 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 27 PID 2000 wrote to memory of 916 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 27 PID 916 wrote to memory of 1560 916 ishost.exe 28 PID 916 wrote to memory of 1560 916 ishost.exe 28 PID 916 wrote to memory of 1560 916 ishost.exe 28 PID 916 wrote to memory of 1560 916 ishost.exe 28 PID 2000 wrote to memory of 1412 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 29 PID 2000 wrote to memory of 1412 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 29 PID 2000 wrote to memory of 1412 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 29 PID 2000 wrote to memory of 1412 2000 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe"C:\Users\Admin\AppData\Local\Temp\e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\ishost.exeC:\Windows\system32\ishost.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\ismini.exeC:\Windows\system32\ismini.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E81584~1.EXE > nul2⤵
- Deletes itself
PID:1412
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD50d953795d16d21afbef4eaeeb1e912bc
SHA150ec9290f4e96f1903b03e93dd471538ac0cee48
SHA2567fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22
SHA51271d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b
-
Filesize
33KB
MD50d953795d16d21afbef4eaeeb1e912bc
SHA150ec9290f4e96f1903b03e93dd471538ac0cee48
SHA2567fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22
SHA51271d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b
-
Filesize
4KB
MD51643c0c6446c19b0a4fa925953b23564
SHA1e31991c436cdfca8937ca27c28d9bd9e830aa0bb
SHA256649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885
SHA512095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527
-
Filesize
33KB
MD50d953795d16d21afbef4eaeeb1e912bc
SHA150ec9290f4e96f1903b03e93dd471538ac0cee48
SHA2567fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22
SHA51271d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b
-
Filesize
33KB
MD50d953795d16d21afbef4eaeeb1e912bc
SHA150ec9290f4e96f1903b03e93dd471538ac0cee48
SHA2567fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22
SHA51271d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b
-
Filesize
4KB
MD51643c0c6446c19b0a4fa925953b23564
SHA1e31991c436cdfca8937ca27c28d9bd9e830aa0bb
SHA256649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885
SHA512095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527
-
Filesize
4KB
MD51643c0c6446c19b0a4fa925953b23564
SHA1e31991c436cdfca8937ca27c28d9bd9e830aa0bb
SHA256649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885
SHA512095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527