Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe
Resource
win10v2004-20220812-en
General
-
Target
b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe
-
Size
76KB
-
MD5
6b45e97402c483b4aca61f3f70f26848
-
SHA1
40199f38a00da11048d10afba26f953b782a403a
-
SHA256
b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874
-
SHA512
ee0e4496368fcd48618eef17b6c2f9234db12fc91188e346490331df1f9a9070d2da3aabae6f2f5c49049a30e38ae7228a1056168ce32e8b8ca73a7baa67919e
-
SSDEEP
1536:xidlOpARzc+o3Kef6b4BnnjmNHp0HHJazt+ZeR9:MdguxfbknywHHJaRB9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 684 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1636 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1636 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 684 1724 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe 28 PID 1724 wrote to memory of 684 1724 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe 28 PID 1724 wrote to memory of 684 1724 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe 28 PID 1724 wrote to memory of 684 1724 b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe 28 PID 684 wrote to memory of 1636 684 cmd.exe 30 PID 684 wrote to memory of 1636 684 cmd.exe 30 PID 684 wrote to memory of 1636 684 cmd.exe 30 PID 684 wrote to memory of 1636 684 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe"C:\Users\Admin\AppData\Local\Temp\b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del b116eaa14d9c947b1f7c4b6368d2a9bb29ae297f0e0fbc5fed8c185355ab6874.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-