Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe
Resource
win10v2004-20220812-en
General
-
Target
1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe
-
Size
64KB
-
MD5
456aa128eae1b4119238bfd4ae945f10
-
SHA1
4aafcbdd1f98b921291b55b0af8402cff94b11a4
-
SHA256
1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30
-
SHA512
ffdf37239cdc15e913dddc597b07e0cae01c91882e07e3a38a71d19eca84bb6696bba32b01885f849cf851d05454ffe1a65639abc595655591b4be5788a4d4cc
-
SSDEEP
768:BoNHCKIJiMDNZQHegeH22Au7gOKktdptJf1IHI8ANO26n6m+XqhuBhGXo:BoNiL8+/vSHBT26n6LquaX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1300 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 272 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 272 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1212 1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1300 1212 1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe 28 PID 1212 wrote to memory of 1300 1212 1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe 28 PID 1212 wrote to memory of 1300 1212 1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe 28 PID 1212 wrote to memory of 1300 1212 1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe 28 PID 1300 wrote to memory of 272 1300 cmd.exe 30 PID 1300 wrote to memory of 272 1300 cmd.exe 30 PID 1300 wrote to memory of 272 1300 cmd.exe 30 PID 1300 wrote to memory of 272 1300 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe"C:\Users\Admin\AppData\Local\Temp\1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 1fc479dadbc53620d9ae15faa343ca53051789bed229620f5bcbcaf5c5fccf30.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:272
-
-