Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe
Resource
win10v2004-20220812-en
General
-
Target
f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe
-
Size
219KB
-
MD5
6c12cfbc72340ca158e38fe8ed4a2537
-
SHA1
fde2703015d0c1c84e7d18a06774cdb44afd1b69
-
SHA256
f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd
-
SHA512
4a8605952b690f1a3df4d649ea3188e3251e1a874e7a74df260c3beb6e054521214c646a7c7fcca34623a8092e7863ac84bf1da2b6c5dd56a1361d44ac6c3e48
-
SSDEEP
3072:MI8MLq3gDmyPp2lkygCkkgxMVDJ1nQtwxqye44co:MI8MLDDD7y1knxMcyH4c
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1224 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1224 1388 f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe 27 PID 1388 wrote to memory of 1224 1388 f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe 27 PID 1388 wrote to memory of 1224 1388 f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe 27 PID 1388 wrote to memory of 1224 1388 f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe 27 PID 1388 wrote to memory of 1224 1388 f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe 27 PID 1388 wrote to memory of 1224 1388 f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe 27 PID 1388 wrote to memory of 1224 1388 f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe"C:\Users\Admin\AppData\Local\Temp\f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ppp..bat" > nul 2> nul2⤵
- Deletes itself
PID:1224
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5eb799863a8e3d482cc28aadf7574a9d2
SHA19c4d020571dd8deef17e16607e33eb4cfd1bf760
SHA25698f7f3d4ce2188ca68e8f91e0117e2d725fdce0047ed254520a1f4b0c24607b5
SHA5120d7c422b81a8963c03677be8566bd7206ff5e6199a01d76d1b3b077f7f8064e8d7b4a966d48212f3f816e52ae726bba6fa7044789d9eb8bac900aa253a52ca71