Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe
Resource
win10v2004-20220812-en
General
-
Target
c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe
-
Size
158KB
-
MD5
307377df5de60955137d5bb130fe00f0
-
SHA1
355cb6156cb5a26b65b5fcbc2bbe6d811f07810e
-
SHA256
c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88
-
SHA512
6b74fcfef07ba1c54c7a95b09b180185466bf4c3c19116dc297fb45e961beb9507d5899733fd915a4af6f4b97e21c2c2dc0c499e04b8069f99e1958077956135
-
SSDEEP
3072:+nj91tfUQINndIc0J+oWRPI5GeV+2IS8SFOL6Q4Kt/9X+5th:+jrei9WOg1SHbu/B+5th
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1496 .Download-Server.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\E38F4.exe.exe .Download-Server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\E38F4.exe.exe .Download-Server.exe -
Loads dropped DLL 2 IoCs
pid Process 1468 c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe 1468 c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 .Download-Server.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1496 1468 c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe 27 PID 1468 wrote to memory of 1496 1468 c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe 27 PID 1468 wrote to memory of 1496 1468 c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe 27 PID 1468 wrote to memory of 1496 1468 c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe 27 PID 1496 wrote to memory of 1160 1496 .Download-Server.exe 28 PID 1496 wrote to memory of 1160 1496 .Download-Server.exe 28 PID 1496 wrote to memory of 1160 1496 .Download-Server.exe 28 PID 1496 wrote to memory of 1160 1496 .Download-Server.exe 28 PID 1160 wrote to memory of 584 1160 net.exe 30 PID 1160 wrote to memory of 584 1160 net.exe 30 PID 1160 wrote to memory of 584 1160 net.exe 30 PID 1160 wrote to memory of 584 1160 net.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe"C:\Users\Admin\AppData\Local\Temp\c6fa0ae06b486d2b6c09f7de6d18902276dcc7de5fb481a1d1a93f710370bd88.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\.Download-Server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\.Download-Server.exe2⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:584
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5ca8c0aca646aae4a7029ae898efc346d
SHA1785ca48171fd02481769f46d504897f025f42d41
SHA25667ba1b63d2ccd57013b42cccc4bcfd4537c9cab98a128f1a1e365c86645a67c6
SHA5127fbb337e5cb97a05217ac679523d926f213007d053d9823fa980b46ef091557be74c933034ff5ea3efb301915d00d6dfe60f8a7d39c54cdc6946ca0abac1223a
-
Filesize
76KB
MD5ca8c0aca646aae4a7029ae898efc346d
SHA1785ca48171fd02481769f46d504897f025f42d41
SHA25667ba1b63d2ccd57013b42cccc4bcfd4537c9cab98a128f1a1e365c86645a67c6
SHA5127fbb337e5cb97a05217ac679523d926f213007d053d9823fa980b46ef091557be74c933034ff5ea3efb301915d00d6dfe60f8a7d39c54cdc6946ca0abac1223a
-
Filesize
76KB
MD5ca8c0aca646aae4a7029ae898efc346d
SHA1785ca48171fd02481769f46d504897f025f42d41
SHA25667ba1b63d2ccd57013b42cccc4bcfd4537c9cab98a128f1a1e365c86645a67c6
SHA5127fbb337e5cb97a05217ac679523d926f213007d053d9823fa980b46ef091557be74c933034ff5ea3efb301915d00d6dfe60f8a7d39c54cdc6946ca0abac1223a
-
Filesize
76KB
MD5ca8c0aca646aae4a7029ae898efc346d
SHA1785ca48171fd02481769f46d504897f025f42d41
SHA25667ba1b63d2ccd57013b42cccc4bcfd4537c9cab98a128f1a1e365c86645a67c6
SHA5127fbb337e5cb97a05217ac679523d926f213007d053d9823fa980b46ef091557be74c933034ff5ea3efb301915d00d6dfe60f8a7d39c54cdc6946ca0abac1223a