Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    26s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 13:07

General

  • Target

    f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe

  • Size

    219KB

  • MD5

    6c12cfbc72340ca158e38fe8ed4a2537

  • SHA1

    fde2703015d0c1c84e7d18a06774cdb44afd1b69

  • SHA256

    f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd

  • SHA512

    4a8605952b690f1a3df4d649ea3188e3251e1a874e7a74df260c3beb6e054521214c646a7c7fcca34623a8092e7863ac84bf1da2b6c5dd56a1361d44ac6c3e48

  • SSDEEP

    3072:MI8MLq3gDmyPp2lkygCkkgxMVDJ1nQtwxqye44co:MI8MLDDD7y1knxMcyH4c

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe
    "C:\Users\Admin\AppData\Local\Temp\f239d96585d337dd33df83852593293acb93c8e6b9c390af7278927fb0673ccd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ppp..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:1224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Ppp..bat

    Filesize

    274B

    MD5

    eb799863a8e3d482cc28aadf7574a9d2

    SHA1

    9c4d020571dd8deef17e16607e33eb4cfd1bf760

    SHA256

    98f7f3d4ce2188ca68e8f91e0117e2d725fdce0047ed254520a1f4b0c24607b5

    SHA512

    0d7c422b81a8963c03677be8566bd7206ff5e6199a01d76d1b3b077f7f8064e8d7b4a966d48212f3f816e52ae726bba6fa7044789d9eb8bac900aa253a52ca71

  • memory/1388-54-0x0000000074AD1000-0x0000000074AD3000-memory.dmp

    Filesize

    8KB

  • memory/1388-55-0x0000000000310000-0x000000000032E000-memory.dmp

    Filesize

    120KB

  • memory/1388-56-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1388-57-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1388-59-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB