Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe
Resource
win10v2004-20220812-en
General
-
Target
eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe
-
Size
36KB
-
MD5
5714cbdcc9fcc0902078e3e00f6f8318
-
SHA1
b7c46bc7ae6b6d2ca61ab4172bf106f0a3a42480
-
SHA256
eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104
-
SHA512
3cf729d8ee5bc668d40ae38490b8939fdb41b0fa579d3d2961969e9f3e68a825bb1bf113495fbcab0271a003fbfcfcb0438ddc20713807f550cc5d5c4ac0e549
-
SSDEEP
384:fsjcZTurRgiI+pDU68x1kE1h8GImYJMGkvvGd23AcYCthUnFK+RLW7FJDlKNAUCr:1ZTEgiTDUaF4K33CXUFOknm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1892 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe 2016 eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NVIDIA Media Center Library = "C:\\Users\\Admin\\Admin1\\winlogon.exe" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\NVIDIA Media Center Library = "C:\\Users\\Admin\\Admin1\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2016 eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe 1892 winlogon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1892 2016 eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe 26 PID 2016 wrote to memory of 1892 2016 eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe 26 PID 2016 wrote to memory of 1892 2016 eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe 26 PID 2016 wrote to memory of 1892 2016 eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe"C:\Users\Admin\AppData\Local\Temp\eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\Admin1\winlogon.exe"C:\Users\Admin\Admin1\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD55714cbdcc9fcc0902078e3e00f6f8318
SHA1b7c46bc7ae6b6d2ca61ab4172bf106f0a3a42480
SHA256eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104
SHA5123cf729d8ee5bc668d40ae38490b8939fdb41b0fa579d3d2961969e9f3e68a825bb1bf113495fbcab0271a003fbfcfcb0438ddc20713807f550cc5d5c4ac0e549
-
Filesize
36KB
MD55714cbdcc9fcc0902078e3e00f6f8318
SHA1b7c46bc7ae6b6d2ca61ab4172bf106f0a3a42480
SHA256eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104
SHA5123cf729d8ee5bc668d40ae38490b8939fdb41b0fa579d3d2961969e9f3e68a825bb1bf113495fbcab0271a003fbfcfcb0438ddc20713807f550cc5d5c4ac0e549
-
Filesize
36KB
MD55714cbdcc9fcc0902078e3e00f6f8318
SHA1b7c46bc7ae6b6d2ca61ab4172bf106f0a3a42480
SHA256eaf88aaa9f7adf0c8dc9054eddc35fa9c1681823e6d9486a536ba4c73cadb104
SHA5123cf729d8ee5bc668d40ae38490b8939fdb41b0fa579d3d2961969e9f3e68a825bb1bf113495fbcab0271a003fbfcfcb0438ddc20713807f550cc5d5c4ac0e549