Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe
Resource
win10v2004-20220812-en
General
-
Target
41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe
-
Size
82KB
-
MD5
6958068037ed95a6f3c78c007cf013f0
-
SHA1
795790f1b77b417c34d715c9c54dc2a76f9bc928
-
SHA256
41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838
-
SHA512
8780221025686ef18be3e0e92936db23ed2c9005f6c9b63d524ecb0ede6b3432aa2a2bad6b8f729f73289d750bd2f106281f34234cf7b3c66d501a4f987e0f84
-
SSDEEP
1536:Dj28KTKXXuMVgVnzt/5/1G3cyHAbbfQnf2yVJW:SginzlR1fzbfQfn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1088 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 692 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 692 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2016 41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1088 2016 41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe 28 PID 2016 wrote to memory of 1088 2016 41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe 28 PID 2016 wrote to memory of 1088 2016 41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe 28 PID 2016 wrote to memory of 1088 2016 41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe 28 PID 1088 wrote to memory of 692 1088 cmd.exe 30 PID 1088 wrote to memory of 692 1088 cmd.exe 30 PID 1088 wrote to memory of 692 1088 cmd.exe 30 PID 1088 wrote to memory of 692 1088 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe"C:\Users\Admin\AppData\Local\Temp\41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 41b3719f6edd47064edfd263a3afaee39341956582c45e1fe2f4e7e127fd4838.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-