Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe
Resource
win10v2004-20220812-en
General
-
Target
2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe
-
Size
68KB
-
MD5
6327346c9a1122154a1bbcd308bc3f40
-
SHA1
72819c7ad4d359da77d0502fdc1af13a5d5df204
-
SHA256
2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f
-
SHA512
635d63dedb0ba4aa806b28e0cf10461a29af700b5fd9550c77cac6b6114cd2d3fdd11978c4718d143e47660d1feb6247842583873ca7595cce5e1879e4d69c64
-
SSDEEP
768:5Q5YEEwuzZSa+kHC9EOnI8Po3LQdkMvy9qf77NvCclAYKb7bsNU:5Q5YE8zUa+kig8PgLQdkMvqwtlcf4U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 780 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 688 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 688 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 912 2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 912 wrote to memory of 780 912 2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe 28 PID 912 wrote to memory of 780 912 2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe 28 PID 912 wrote to memory of 780 912 2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe 28 PID 912 wrote to memory of 780 912 2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe 28 PID 780 wrote to memory of 688 780 cmd.exe 30 PID 780 wrote to memory of 688 780 cmd.exe 30 PID 780 wrote to memory of 688 780 cmd.exe 30 PID 780 wrote to memory of 688 780 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe"C:\Users\Admin\AppData\Local\Temp\2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 2687a6031243c5c3e6e6197d3eb5979a78779e8359f3b6a9481e2e9a9be8c20f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-