Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 19:25
Behavioral task
behavioral1
Sample
96c394b741b7451872c658be5aa1283d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96c394b741b7451872c658be5aa1283d.exe
Resource
win10v2004-20220812-en
General
-
Target
96c394b741b7451872c658be5aa1283d.exe
-
Size
73KB
-
MD5
96c394b741b7451872c658be5aa1283d
-
SHA1
b00a0c4073a1192e8061c11521f00a167ba76df7
-
SHA256
34a76a64e1a7a96c82f37c25c3861cb959584497e3d4bf8344ea7468a1b925a8
-
SHA512
3d777d58b44518a08c77ddc366821fc4d7906f4b6c68bd794328a1fc0a47a895785ce47b97eee74de617cf0ba358546b1f3a4875907b60446b5f60c798674400
-
SSDEEP
1536:JgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:JMSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 96c394b741b7451872c658be5aa1283d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\jzbxlmodgcz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96c394b741b7451872c658be5aa1283d.exe" 96c394b741b7451872c658be5aa1283d.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\O: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\X: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\Z: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\A: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\E: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\H: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\I: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\N: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\Q: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\W: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\Y: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\B: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\J: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\R: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\T: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\U: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\V: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\F: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\G: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\K: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\M: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\P: 96c394b741b7451872c658be5aa1283d.exe File opened (read-only) \??\S: 96c394b741b7451872c658be5aa1283d.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 96c394b741b7451872c658be5aa1283d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 96c394b741b7451872c658be5aa1283d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 96c394b741b7451872c658be5aa1283d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1980 96c394b741b7451872c658be5aa1283d.exe 1980 96c394b741b7451872c658be5aa1283d.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1980 wrote to memory of 760 1980 96c394b741b7451872c658be5aa1283d.exe 30 PID 1980 wrote to memory of 760 1980 96c394b741b7451872c658be5aa1283d.exe 30 PID 1980 wrote to memory of 760 1980 96c394b741b7451872c658be5aa1283d.exe 30 PID 1980 wrote to memory of 760 1980 96c394b741b7451872c658be5aa1283d.exe 30 PID 1980 wrote to memory of 820 1980 96c394b741b7451872c658be5aa1283d.exe 32 PID 1980 wrote to memory of 820 1980 96c394b741b7451872c658be5aa1283d.exe 32 PID 1980 wrote to memory of 820 1980 96c394b741b7451872c658be5aa1283d.exe 32 PID 1980 wrote to memory of 820 1980 96c394b741b7451872c658be5aa1283d.exe 32 PID 1980 wrote to memory of 1820 1980 96c394b741b7451872c658be5aa1283d.exe 34 PID 1980 wrote to memory of 1820 1980 96c394b741b7451872c658be5aa1283d.exe 34 PID 1980 wrote to memory of 1820 1980 96c394b741b7451872c658be5aa1283d.exe 34 PID 1980 wrote to memory of 1820 1980 96c394b741b7451872c658be5aa1283d.exe 34 PID 1980 wrote to memory of 1040 1980 96c394b741b7451872c658be5aa1283d.exe 36 PID 1980 wrote to memory of 1040 1980 96c394b741b7451872c658be5aa1283d.exe 36 PID 1980 wrote to memory of 1040 1980 96c394b741b7451872c658be5aa1283d.exe 36 PID 1980 wrote to memory of 1040 1980 96c394b741b7451872c658be5aa1283d.exe 36 PID 1980 wrote to memory of 856 1980 96c394b741b7451872c658be5aa1283d.exe 38 PID 1980 wrote to memory of 856 1980 96c394b741b7451872c658be5aa1283d.exe 38 PID 1980 wrote to memory of 856 1980 96c394b741b7451872c658be5aa1283d.exe 38 PID 1980 wrote to memory of 856 1980 96c394b741b7451872c658be5aa1283d.exe 38 PID 1980 wrote to memory of 1712 1980 96c394b741b7451872c658be5aa1283d.exe 40 PID 1980 wrote to memory of 1712 1980 96c394b741b7451872c658be5aa1283d.exe 40 PID 1980 wrote to memory of 1712 1980 96c394b741b7451872c658be5aa1283d.exe 40 PID 1980 wrote to memory of 1712 1980 96c394b741b7451872c658be5aa1283d.exe 40 PID 1980 wrote to memory of 2016 1980 96c394b741b7451872c658be5aa1283d.exe 42 PID 1980 wrote to memory of 2016 1980 96c394b741b7451872c658be5aa1283d.exe 42 PID 1980 wrote to memory of 2016 1980 96c394b741b7451872c658be5aa1283d.exe 42 PID 1980 wrote to memory of 2016 1980 96c394b741b7451872c658be5aa1283d.exe 42 PID 1980 wrote to memory of 1148 1980 96c394b741b7451872c658be5aa1283d.exe 44 PID 1980 wrote to memory of 1148 1980 96c394b741b7451872c658be5aa1283d.exe 44 PID 1980 wrote to memory of 1148 1980 96c394b741b7451872c658be5aa1283d.exe 44 PID 1980 wrote to memory of 1148 1980 96c394b741b7451872c658be5aa1283d.exe 44 PID 1980 wrote to memory of 1936 1980 96c394b741b7451872c658be5aa1283d.exe 46 PID 1980 wrote to memory of 1936 1980 96c394b741b7451872c658be5aa1283d.exe 46 PID 1980 wrote to memory of 1936 1980 96c394b741b7451872c658be5aa1283d.exe 46 PID 1980 wrote to memory of 1936 1980 96c394b741b7451872c658be5aa1283d.exe 46 PID 1980 wrote to memory of 884 1980 96c394b741b7451872c658be5aa1283d.exe 48 PID 1980 wrote to memory of 884 1980 96c394b741b7451872c658be5aa1283d.exe 48 PID 1980 wrote to memory of 884 1980 96c394b741b7451872c658be5aa1283d.exe 48 PID 1980 wrote to memory of 884 1980 96c394b741b7451872c658be5aa1283d.exe 48 PID 1980 wrote to memory of 1576 1980 96c394b741b7451872c658be5aa1283d.exe 50 PID 1980 wrote to memory of 1576 1980 96c394b741b7451872c658be5aa1283d.exe 50 PID 1980 wrote to memory of 1576 1980 96c394b741b7451872c658be5aa1283d.exe 50 PID 1980 wrote to memory of 1576 1980 96c394b741b7451872c658be5aa1283d.exe 50 PID 1980 wrote to memory of 1876 1980 96c394b741b7451872c658be5aa1283d.exe 52 PID 1980 wrote to memory of 1876 1980 96c394b741b7451872c658be5aa1283d.exe 52 PID 1980 wrote to memory of 1876 1980 96c394b741b7451872c658be5aa1283d.exe 52 PID 1980 wrote to memory of 1876 1980 96c394b741b7451872c658be5aa1283d.exe 52 PID 1980 wrote to memory of 1696 1980 96c394b741b7451872c658be5aa1283d.exe 54 PID 1980 wrote to memory of 1696 1980 96c394b741b7451872c658be5aa1283d.exe 54 PID 1980 wrote to memory of 1696 1980 96c394b741b7451872c658be5aa1283d.exe 54 PID 1980 wrote to memory of 1696 1980 96c394b741b7451872c658be5aa1283d.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\96c394b741b7451872c658be5aa1283d.exe"C:\Users\Admin\AppData\Local\Temp\96c394b741b7451872c658be5aa1283d.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:760
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1040
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:856
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1712
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1148
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1936
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:884
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1576
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1696
-