Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/10/2022, 15:44

221005-s6qw1sfacr 8

05/10/2022, 15:40

221005-s4paeafacn 8

Analysis

  • max time kernel
    145s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2022, 15:40

General

  • Target

    Sophos_Sample.zip

  • Size

    12KB

  • MD5

    0af639f822f4c5a66af3802362c610e3

  • SHA1

    bb35adb8c4ad48a4aef5e3bf24a9ad92f6bc5c6b

  • SHA256

    bb2c4f2a539ced238067210cc30dd58df0d94d9e9efff4962eb21a485a15cccf

  • SHA512

    4e181db7382552abfc6b09a4f4c0bc62852416b3e51c262ba63554f0ca4916e3a4b670ed9ed58a8c626e2f9e3ea7b68347e8df5e7c23b98a532e5f6b30e1c01d

  • SSDEEP

    384:PBWfRmI+v2/V6BhKlPxmE/UzqiDqfjgcXy42v0uaBZ:PBWZmIu2/8BhK4RqiLcX32vBaBZ

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Sophos_Sample.zip
    1⤵
      PID:1328
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:616
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x1c8
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1716
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Temp1_Sophos_Sample.zip\2047415.wmo
        1⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\PROGRA~2\MICROS~1\Office14\OIS.EXE
          "C:\PROGRA~2\MICROS~1\Office14\OIS.EXE" /shellOpen "C:\Users\Admin\AppData\Local\Temp\Temp1_Sophos_Sample.zip\2047415.wmo"
          2⤵
          • Suspicious use of SetWindowsHookEx
          PID:1764
      • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\Desktop\2047415.msg"
        1⤵
        • Accesses Microsoft Outlook profiles
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • NTFS ADS
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • outlook_win_path
        PID:1948
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_Image0.zip\368025163109.hta"
        1⤵
        • Blocklisted process makes network request
        PID:1192

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/616-54-0x000007FEFBC31000-0x000007FEFBC33000-memory.dmp

        Filesize

        8KB

      • memory/1764-57-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

        Filesize

        8KB

      • memory/1764-58-0x00000000727C1000-0x00000000727C3000-memory.dmp

        Filesize

        8KB

      • memory/1764-59-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1764-60-0x00000000737AD000-0x00000000737B8000-memory.dmp

        Filesize

        44KB

      • memory/1764-61-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1764-62-0x00000000737AD000-0x00000000737B8000-memory.dmp

        Filesize

        44KB

      • memory/1948-63-0x00000000715E1000-0x00000000715E3000-memory.dmp

        Filesize

        8KB

      • memory/1948-64-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1948-66-0x00000000725CD000-0x00000000725D8000-memory.dmp

        Filesize

        44KB

      • memory/1948-67-0x000000000ACF0000-0x000000000AD3E000-memory.dmp

        Filesize

        312KB