Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 15:04
Behavioral task
behavioral1
Sample
90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe
Resource
win10v2004-20220812-en
General
-
Target
90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe
-
Size
136KB
-
MD5
6eeaada50798013dd168e87338e5a9ad
-
SHA1
84efab6d3197f5079ee7e10696c5ea32d2f1e9ba
-
SHA256
90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600
-
SHA512
d730ca61985204889e05859071330fa265c6cf4084b281b19b0f5ba906de7edab494855b3e2f8beefc0e89dad85bc3bdf4cea094cc66fef4d1956bef92211e67
-
SSDEEP
3072:nIqDfnQoB3+Lp7xV9I9Xde980plLFEb6G:IunQyAxrI9XABLlG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1392 ÓíÑÝÑ ÎÇã.exe -
Loads dropped DLL 2 IoCs
pid Process 112 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe 112 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1392 ÓíÑÝÑ ÎÇã.exe 1392 ÓíÑÝÑ ÎÇã.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 112 wrote to memory of 1392 112 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe 27 PID 112 wrote to memory of 1392 112 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe 27 PID 112 wrote to memory of 1392 112 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe 27 PID 112 wrote to memory of 1392 112 90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe 27 PID 1392 wrote to memory of 1380 1392 ÓíÑÝÑ ÎÇã.exe 19 PID 1392 wrote to memory of 1380 1392 ÓíÑÝÑ ÎÇã.exe 19 PID 1392 wrote to memory of 1380 1392 ÓíÑÝÑ ÎÇã.exe 19 PID 1392 wrote to memory of 1380 1392 ÓíÑÝÑ ÎÇã.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe"C:\Users\Admin\AppData\Local\Temp\90f8be696c84a9d1a4f49750a35f236a04d6065b5298280d3d341e3939045600.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\ÓíÑÝÑ ÎÇã.exe"C:\Users\Admin\AppData\Local\Temp\ÓíÑÝÑ ÎÇã.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1392
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD51b3c363fddf99949e01973e0bbc5b7f3
SHA1566b05684ea325008a5aaf8778254d52d5a82df8
SHA2561175bee3256c99e4e7a01b9c62e9c17d53c5eed6ee144763c793f94262505b54
SHA5128fd9b4a1364da3f740b685cef23cec974113773c68f8e7ba383506e7e404722263b8c2b115a92e8d775aff1c5e1293903238a4823c8e44b8ca712e1d6733346f
-
Filesize
56KB
MD5e61e34288f0a9dd588999821579d6acf
SHA16324ba0e1efc9ff50be28dbd0e803419da3d61aa
SHA256caf7a144bc43684c5ecca9ae485847cdb404ae87d707ab4fe933f0abcc264c5e
SHA5120ea259cd56572898557f895ca567f190d31ca98f17c9c89317fb3e54166166341e167a6731ffb68953548c7f99e1caa3d4e511f6feb4ac0b94fb7412d8ebdc32
-
Filesize
56KB
MD5e61e34288f0a9dd588999821579d6acf
SHA16324ba0e1efc9ff50be28dbd0e803419da3d61aa
SHA256caf7a144bc43684c5ecca9ae485847cdb404ae87d707ab4fe933f0abcc264c5e
SHA5120ea259cd56572898557f895ca567f190d31ca98f17c9c89317fb3e54166166341e167a6731ffb68953548c7f99e1caa3d4e511f6feb4ac0b94fb7412d8ebdc32
-
Filesize
56KB
MD5e61e34288f0a9dd588999821579d6acf
SHA16324ba0e1efc9ff50be28dbd0e803419da3d61aa
SHA256caf7a144bc43684c5ecca9ae485847cdb404ae87d707ab4fe933f0abcc264c5e
SHA5120ea259cd56572898557f895ca567f190d31ca98f17c9c89317fb3e54166166341e167a6731ffb68953548c7f99e1caa3d4e511f6feb4ac0b94fb7412d8ebdc32
-
Filesize
56KB
MD5e61e34288f0a9dd588999821579d6acf
SHA16324ba0e1efc9ff50be28dbd0e803419da3d61aa
SHA256caf7a144bc43684c5ecca9ae485847cdb404ae87d707ab4fe933f0abcc264c5e
SHA5120ea259cd56572898557f895ca567f190d31ca98f17c9c89317fb3e54166166341e167a6731ffb68953548c7f99e1caa3d4e511f6feb4ac0b94fb7412d8ebdc32