Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe
Resource
win10v2004-20220812-en
General
-
Target
b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe
-
Size
856KB
-
MD5
70468606a8a9d89f3a072356b9a36ff0
-
SHA1
498c188f02cb551c76aae3b0a9d8854e2d228cbb
-
SHA256
b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8
-
SHA512
edec75128fa8359e365f851833dfbecb2797157569e2a1b2a00667d658888e278fd9683e1d0a5a5ecde690502ff74c577f0ab9154e0f48c3ff5eaa64452b4550
-
SSDEEP
12288:dNOVvQ08oa2FzG7ABq7bu24yyAZq45GtWobcVnSGtF+ZwKgxvNofc581kScMP00h:nOVAqFq7x7bu2XhYcoAnSQdvNqkS40
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 984 582103.exe -
Deletes itself 1 IoCs
pid Process 1160 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 1160 cmd.exe 1160 cmd.exe 984 582103.exe 984 582103.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\582103 = "\"C:\\Users\\Admin\\AppData\\Local\\582103.exe\" 0 21 " 582103.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8 = "\"C:\\Users\\Admin\\AppData\\Local\\582103.exe\" 0 22 " b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 582103.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1476 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 984 582103.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe 984 582103.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1160 1424 b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe 26 PID 1424 wrote to memory of 1160 1424 b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe 26 PID 1424 wrote to memory of 1160 1424 b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe 26 PID 1424 wrote to memory of 1160 1424 b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe 26 PID 1160 wrote to memory of 1476 1160 cmd.exe 28 PID 1160 wrote to memory of 1476 1160 cmd.exe 28 PID 1160 wrote to memory of 1476 1160 cmd.exe 28 PID 1160 wrote to memory of 1476 1160 cmd.exe 28 PID 1160 wrote to memory of 984 1160 cmd.exe 29 PID 1160 wrote to memory of 984 1160 cmd.exe 29 PID 1160 wrote to memory of 984 1160 cmd.exe 29 PID 1160 wrote to memory of 984 1160 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe"C:\Users\Admin\AppData\Local\Temp\b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7426700848.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8 /f3⤵
- Modifies registry key
PID:1476
-
-
C:\Users\Admin\AppData\Local\582103.exeC:\Users\Admin\AppData\Local\582103.exe -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
856KB
MD570468606a8a9d89f3a072356b9a36ff0
SHA1498c188f02cb551c76aae3b0a9d8854e2d228cbb
SHA256b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8
SHA512edec75128fa8359e365f851833dfbecb2797157569e2a1b2a00667d658888e278fd9683e1d0a5a5ecde690502ff74c577f0ab9154e0f48c3ff5eaa64452b4550
-
Filesize
856KB
MD570468606a8a9d89f3a072356b9a36ff0
SHA1498c188f02cb551c76aae3b0a9d8854e2d228cbb
SHA256b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8
SHA512edec75128fa8359e365f851833dfbecb2797157569e2a1b2a00667d658888e278fd9683e1d0a5a5ecde690502ff74c577f0ab9154e0f48c3ff5eaa64452b4550
-
Filesize
456B
MD58a468f7940efd25be0f2f8906b556596
SHA15dff12d3e1711a9549eceaec2a1130e4b5782ce4
SHA256cf109beba7d47373bd55272a5abbef542e98bc56675c4ee3609f53ed89d71270
SHA512b5d05d7fac8696d2ffb722bdb19e4e395b238bee4b71ba4dc35ed381bba32ad627a8084d5ef47d8c3b9edcf65949bdcc02e0ae27364953c79ee2196bd1d38d4a
-
Filesize
856KB
MD570468606a8a9d89f3a072356b9a36ff0
SHA1498c188f02cb551c76aae3b0a9d8854e2d228cbb
SHA256b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8
SHA512edec75128fa8359e365f851833dfbecb2797157569e2a1b2a00667d658888e278fd9683e1d0a5a5ecde690502ff74c577f0ab9154e0f48c3ff5eaa64452b4550
-
Filesize
856KB
MD570468606a8a9d89f3a072356b9a36ff0
SHA1498c188f02cb551c76aae3b0a9d8854e2d228cbb
SHA256b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8
SHA512edec75128fa8359e365f851833dfbecb2797157569e2a1b2a00667d658888e278fd9683e1d0a5a5ecde690502ff74c577f0ab9154e0f48c3ff5eaa64452b4550
-
Filesize
856KB
MD570468606a8a9d89f3a072356b9a36ff0
SHA1498c188f02cb551c76aae3b0a9d8854e2d228cbb
SHA256b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8
SHA512edec75128fa8359e365f851833dfbecb2797157569e2a1b2a00667d658888e278fd9683e1d0a5a5ecde690502ff74c577f0ab9154e0f48c3ff5eaa64452b4550
-
Filesize
856KB
MD570468606a8a9d89f3a072356b9a36ff0
SHA1498c188f02cb551c76aae3b0a9d8854e2d228cbb
SHA256b0e23b57b00d2d60845c57c8b712b06fc2b04c4c772ed12ae6ff4da55f6edaf8
SHA512edec75128fa8359e365f851833dfbecb2797157569e2a1b2a00667d658888e278fd9683e1d0a5a5ecde690502ff74c577f0ab9154e0f48c3ff5eaa64452b4550