Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 02:40

General

  • Target

    dce07bd6395faee9a0b36790e9c8e191deb2f87e24358b0c6dbdfaf8ec31150e.exe

  • Size

    148KB

  • MD5

    599fb8abee9f690a646a8cb71ff06cb0

  • SHA1

    f47ec693fb56832819184eebe477a7defe1bbc30

  • SHA256

    dce07bd6395faee9a0b36790e9c8e191deb2f87e24358b0c6dbdfaf8ec31150e

  • SHA512

    214656633f21b2eec9923e66d3fb97a0e512b03bf53ff8b4a33f3aa79261988417e4011de56e25b8b25c1487f7d5b73dacce894617633284b4aab1511b500529

  • SSDEEP

    1536:ho9LIOf4BlqPAKcxnX+PBcRlouQvSPouXZ6D6Jj5wl+dwCMZUbP7v2YhxYAZxZCZ:u2KalqPpy+Pco6ouZ68Kl+dnMZUbRi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dce07bd6395faee9a0b36790e9c8e191deb2f87e24358b0c6dbdfaf8ec31150e.exe
    "C:\Users\Admin\AppData\Local\Temp\dce07bd6395faee9a0b36790e9c8e191deb2f87e24358b0c6dbdfaf8ec31150e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\wiaoz.exe
      "C:\Users\Admin\wiaoz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wiaoz.exe

    Filesize

    148KB

    MD5

    cf6bf5404f99e0e3d9181f80f62bc82d

    SHA1

    82ab5040c6a44ca92e70caa1757fc9ea4ca4c833

    SHA256

    f9674d70d64d44df6af16609e7abfaea83ad31f137f5a93189db93c3a7b48ce4

    SHA512

    2bdefabefae599a09d8a32d54ed87e6b08c66c4d3efb36937b1cbf5c904970c323d8417fcb0075a9a8d849f0fcae6869282d09775a68b5b87d63d6c7889a9229

  • C:\Users\Admin\wiaoz.exe

    Filesize

    148KB

    MD5

    cf6bf5404f99e0e3d9181f80f62bc82d

    SHA1

    82ab5040c6a44ca92e70caa1757fc9ea4ca4c833

    SHA256

    f9674d70d64d44df6af16609e7abfaea83ad31f137f5a93189db93c3a7b48ce4

    SHA512

    2bdefabefae599a09d8a32d54ed87e6b08c66c4d3efb36937b1cbf5c904970c323d8417fcb0075a9a8d849f0fcae6869282d09775a68b5b87d63d6c7889a9229

  • \Users\Admin\wiaoz.exe

    Filesize

    148KB

    MD5

    cf6bf5404f99e0e3d9181f80f62bc82d

    SHA1

    82ab5040c6a44ca92e70caa1757fc9ea4ca4c833

    SHA256

    f9674d70d64d44df6af16609e7abfaea83ad31f137f5a93189db93c3a7b48ce4

    SHA512

    2bdefabefae599a09d8a32d54ed87e6b08c66c4d3efb36937b1cbf5c904970c323d8417fcb0075a9a8d849f0fcae6869282d09775a68b5b87d63d6c7889a9229

  • \Users\Admin\wiaoz.exe

    Filesize

    148KB

    MD5

    cf6bf5404f99e0e3d9181f80f62bc82d

    SHA1

    82ab5040c6a44ca92e70caa1757fc9ea4ca4c833

    SHA256

    f9674d70d64d44df6af16609e7abfaea83ad31f137f5a93189db93c3a7b48ce4

    SHA512

    2bdefabefae599a09d8a32d54ed87e6b08c66c4d3efb36937b1cbf5c904970c323d8417fcb0075a9a8d849f0fcae6869282d09775a68b5b87d63d6c7889a9229

  • memory/900-56-0x0000000075C61000-0x0000000075C63000-memory.dmp

    Filesize

    8KB