Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe
Resource
win10v2004-20220812-en
General
-
Target
003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe
-
Size
7.4MB
-
MD5
d88dcfc0dfe3ef8b922c35f021a2fd01
-
SHA1
82eb63ac6bc2e2959381a624f868e7b4df032b35
-
SHA256
003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1
-
SHA512
cb31cf8964e8e7be6154992230c03ac0e2422756725efb64be54e485bb8651213a75d76af7cec2d50c1777c103c7f7d4463303edcc6c9d9b22bdcdc8d32c8edb
-
SSDEEP
196608:hHS10ijII3/I0VRcRCDLZXZR9G5DiwBGPCW3tdoZmN5J:hy1T0YI0VmRqLFZSS6W3L
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1472 is-274AK.tmp 1272 UniExtract.exe 632 UniExtract.exe -
Loads dropped DLL 10 IoCs
pid Process 1524 003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe 1472 is-274AK.tmp 1472 is-274AK.tmp 1472 is-274AK.tmp 1472 is-274AK.tmp 1272 UniExtract.exe 1272 UniExtract.exe 1472 is-274AK.tmp 632 UniExtract.exe 632 UniExtract.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Universal Extractor\bin\is-S406I.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\is-30OF4.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\is-MKHN4.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-15FEQ.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-26KSC.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-U0PB0.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-3QDA6.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-EK66R.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-26102.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-PVHO7.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-MTPB2.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-QAHOF.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-TH2E6.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-RN7U7.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-CV9KU.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\is-2N8HJ.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-L86KB.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-VMT12.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-5411V.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-ACDMR.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-Q1T88.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\Unp\is-PDA6H.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\is-1CC46.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-KQB0N.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-QM2HG.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-NPTFT.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-SF42O.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-IUS1L.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-OO2EO.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-JB0MM.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-0OBEG.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-NRNQ0.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-M57NA.tmp is-274AK.tmp File opened for modification C:\Program Files (x86)\Universal Extractor\UniExtract.exe is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-PTMSS.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-JKPGJ.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-N390Q.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-H1TL3.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-0KM13.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-J1LDE.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-UDV1N.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-AG0M5.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-FH3AU.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\Unp\is-43NL3.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-P7FH0.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-9D7RM.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-SDUAV.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-9F2FF.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-JEE0B.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\Unp\is-EDDCF.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\is-U7SBL.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-713JP.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-KN7EJ.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-IDLRH.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-FTE3B.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\Unp\is-56797.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-DMH6N.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-7URGG.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-A0I87.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\is-IM1L9.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-UVAAE.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-QO79G.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\docs\is-FBBO7.tmp is-274AK.tmp File created C:\Program Files (x86)\Universal Extractor\bin\is-IA75R.tmp is-274AK.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 632 UniExtract.exe 632 UniExtract.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1472 1524 003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe 26 PID 1524 wrote to memory of 1472 1524 003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe 26 PID 1524 wrote to memory of 1472 1524 003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe 26 PID 1524 wrote to memory of 1472 1524 003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe 26 PID 1524 wrote to memory of 1472 1524 003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe 26 PID 1524 wrote to memory of 1472 1524 003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe 26 PID 1524 wrote to memory of 1472 1524 003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe 26 PID 1472 wrote to memory of 900 1472 is-274AK.tmp 27 PID 1472 wrote to memory of 900 1472 is-274AK.tmp 27 PID 1472 wrote to memory of 900 1472 is-274AK.tmp 27 PID 1472 wrote to memory of 900 1472 is-274AK.tmp 27 PID 1472 wrote to memory of 900 1472 is-274AK.tmp 27 PID 1472 wrote to memory of 900 1472 is-274AK.tmp 27 PID 1472 wrote to memory of 900 1472 is-274AK.tmp 27 PID 1472 wrote to memory of 1272 1472 is-274AK.tmp 29 PID 1472 wrote to memory of 1272 1472 is-274AK.tmp 29 PID 1472 wrote to memory of 1272 1472 is-274AK.tmp 29 PID 1472 wrote to memory of 1272 1472 is-274AK.tmp 29 PID 1472 wrote to memory of 1272 1472 is-274AK.tmp 29 PID 1472 wrote to memory of 1272 1472 is-274AK.tmp 29 PID 1472 wrote to memory of 1272 1472 is-274AK.tmp 29 PID 1472 wrote to memory of 980 1472 is-274AK.tmp 30 PID 1472 wrote to memory of 980 1472 is-274AK.tmp 30 PID 1472 wrote to memory of 980 1472 is-274AK.tmp 30 PID 1472 wrote to memory of 980 1472 is-274AK.tmp 30 PID 1472 wrote to memory of 980 1472 is-274AK.tmp 30 PID 1472 wrote to memory of 980 1472 is-274AK.tmp 30 PID 1472 wrote to memory of 980 1472 is-274AK.tmp 30 PID 1472 wrote to memory of 632 1472 is-274AK.tmp 32 PID 1472 wrote to memory of 632 1472 is-274AK.tmp 32 PID 1472 wrote to memory of 632 1472 is-274AK.tmp 32 PID 1472 wrote to memory of 632 1472 is-274AK.tmp 32 PID 1472 wrote to memory of 632 1472 is-274AK.tmp 32 PID 1472 wrote to memory of 632 1472 is-274AK.tmp 32 PID 1472 wrote to memory of 632 1472 is-274AK.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe"C:\Users\Admin\AppData\Local\Temp\003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\is-8JCAH.tmp\is-274AK.tmp"C:\Users\Admin\AppData\Local\Temp\is-8JCAH.tmp\is-274AK.tmp" /SL4 $A0150 "C:\Users\Admin\AppData\Local\Temp\003b624a9fbc866238d1fcc3fd3d34033fb7fb4c302402a9c4b36ce979e186f1.exe" 7469234 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:900
-
-
C:\Program Files (x86)\Universal Extractor\UniExtract.exe"C:\Program Files (x86)\Universal Extractor\UniExtract.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1272
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "UniExtract 29"3⤵PID:980
-
-
C:\Program Files (x86)\Universal Extractor\UniExtract.exe"C:\Program Files (x86)\Universal Extractor\UniExtract.exe" 5f5d5a7c6dbe68ab6e1dbd4885ecc8793⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
644KB
MD5d2d4c4adbd8fe86cbef5547c64ff6c3e
SHA1b959a16143a81a1dac99ff387d597e1e20b2b2e0
SHA256abf82ee3b4593051434be8721e79a7df39e75d3078b4fc90a4e0f8a7de6aa3ba
SHA512653bfc044a31794db372b6c3f21c5f97cfd55349953e9a755654263549bc8a5f94e58343a4fd1411ddf550f44526a94027610c212126c98adc123e92670941f6
-
Filesize
644KB
MD5d2d4c4adbd8fe86cbef5547c64ff6c3e
SHA1b959a16143a81a1dac99ff387d597e1e20b2b2e0
SHA256abf82ee3b4593051434be8721e79a7df39e75d3078b4fc90a4e0f8a7de6aa3ba
SHA512653bfc044a31794db372b6c3f21c5f97cfd55349953e9a755654263549bc8a5f94e58343a4fd1411ddf550f44526a94027610c212126c98adc123e92670941f6
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
3.3MB
MD501a2b1c08f362133d69147efeaccd9f3
SHA14ce4452184a1ad4b87e731fdf96d5a66a03c8419
SHA256bf59e116361cde48bd16904af8ac899892282d37d30c6058ff3181c5435d4266
SHA5127c3fd6f5a66520934081c722b8858eb2a0c23b9087ae14698ffc5f8c9c83786b2bdd96790f866354e8b76851cd69be527b9ba7986f2478d648066366f4d1e83b
-
Filesize
644KB
MD5d2d4c4adbd8fe86cbef5547c64ff6c3e
SHA1b959a16143a81a1dac99ff387d597e1e20b2b2e0
SHA256abf82ee3b4593051434be8721e79a7df39e75d3078b4fc90a4e0f8a7de6aa3ba
SHA512653bfc044a31794db372b6c3f21c5f97cfd55349953e9a755654263549bc8a5f94e58343a4fd1411ddf550f44526a94027610c212126c98adc123e92670941f6
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3