Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe
Resource
win10v2004-20220812-en
General
-
Target
5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe
-
Size
84KB
-
MD5
610edadba1155fa24b20c36227a5f1c0
-
SHA1
74db5c9443fbca3f0462b24d20c7c117ae242c6b
-
SHA256
5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33
-
SHA512
9e972c00adbf1c68e82ee14ed93f2ce14a850d6c6f5da9688dba3dc0a733ef7c6d25e70c868f455c21bbd0b4951884a63224e3a6ee33cc5f772c3e24b542caea
-
SSDEEP
1536:dv2g8NyEegve1dkmwQegKYQuCL4mx8lsXit4:dB8NyBgvo6XBYQuCLqlW
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1588 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1588 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1768 5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1108 1768 5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe 28 PID 1768 wrote to memory of 1108 1768 5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe 28 PID 1768 wrote to memory of 1108 1768 5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe 28 PID 1768 wrote to memory of 1108 1768 5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe 28 PID 1108 wrote to memory of 1588 1108 cmd.exe 30 PID 1108 wrote to memory of 1588 1108 cmd.exe 30 PID 1108 wrote to memory of 1588 1108 cmd.exe 30 PID 1108 wrote to memory of 1588 1108 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe"C:\Users\Admin\AppData\Local\Temp\5d4a256dda44b47fdfb836e06a5abcb34e860d430ffdd0d5e4ea00f66ed16e33.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 5d4a256dda44b47fdfb836e06a5abcb34e2⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-