Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 10:14

General

  • Target

    e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe

  • Size

    17KB

  • MD5

    70bc7465bca83546f84e42f9b6609fe0

  • SHA1

    7d29645c17348a14c2b4367b375b61a29e25e52a

  • SHA256

    e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc

  • SHA512

    be34ef94796a2e1eef27ba48af40790f73d58aa999ed4a986f961ec7dad403593e25a31639e12b726b59bfdc100838e6cc73e7ca09972f9e3db0f8555e941213

  • SSDEEP

    384:224bhc6Q1NFMJ70QHgZlOADKni0nhftDZnxRq4BUC2UVQu:llLF070Q8IniQlDRzq6UC2Vu

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe
    "C:\Users\Admin\AppData\Local\Temp\e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\ishost.exe
      C:\Windows\system32\ishost.exe
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Windows\SysWOW64\ismini.exe
        C:\Windows\system32\ismini.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1560
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E81584~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ishost.exe

    Filesize

    33KB

    MD5

    0d953795d16d21afbef4eaeeb1e912bc

    SHA1

    50ec9290f4e96f1903b03e93dd471538ac0cee48

    SHA256

    7fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22

    SHA512

    71d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b

  • C:\Windows\SysWOW64\ishost.exe

    Filesize

    33KB

    MD5

    0d953795d16d21afbef4eaeeb1e912bc

    SHA1

    50ec9290f4e96f1903b03e93dd471538ac0cee48

    SHA256

    7fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22

    SHA512

    71d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b

  • C:\Windows\SysWOW64\ismini.exe

    Filesize

    4KB

    MD5

    1643c0c6446c19b0a4fa925953b23564

    SHA1

    e31991c436cdfca8937ca27c28d9bd9e830aa0bb

    SHA256

    649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885

    SHA512

    095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527

  • \Windows\SysWOW64\ishost.exe

    Filesize

    33KB

    MD5

    0d953795d16d21afbef4eaeeb1e912bc

    SHA1

    50ec9290f4e96f1903b03e93dd471538ac0cee48

    SHA256

    7fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22

    SHA512

    71d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b

  • \Windows\SysWOW64\ishost.exe

    Filesize

    33KB

    MD5

    0d953795d16d21afbef4eaeeb1e912bc

    SHA1

    50ec9290f4e96f1903b03e93dd471538ac0cee48

    SHA256

    7fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22

    SHA512

    71d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b

  • \Windows\SysWOW64\ismini.exe

    Filesize

    4KB

    MD5

    1643c0c6446c19b0a4fa925953b23564

    SHA1

    e31991c436cdfca8937ca27c28d9bd9e830aa0bb

    SHA256

    649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885

    SHA512

    095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527

  • \Windows\SysWOW64\ismini.exe

    Filesize

    4KB

    MD5

    1643c0c6446c19b0a4fa925953b23564

    SHA1

    e31991c436cdfca8937ca27c28d9bd9e830aa0bb

    SHA256

    649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885

    SHA512

    095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527

  • memory/2000-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

    Filesize

    8KB