Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe
Resource
win10v2004-20220812-en
General
-
Target
c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe
-
Size
30KB
-
MD5
626e3be2e54806ce211505d05f3b5705
-
SHA1
65c95781ea64032a4e0e0fccdd2de5af3ae85fbe
-
SHA256
c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf
-
SHA512
5ff3682362531153d063347369a966b3bbd663d261a6c4e973942e4189a8d2bdb258b6eefb99efbe4a2d5374915ee8093d6236379f61f4e75dd6dbde21c375ac
-
SSDEEP
384:cB6/oFQ7AhDGvgMO7U1VN+uXL7SkjkKqu3pLqG1a/9Tt:cB6/AnEO7juX/qKX3IMa/9Tt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 388 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1572 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1572 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 992 c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 992 wrote to memory of 388 992 c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe 30 PID 992 wrote to memory of 388 992 c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe 30 PID 992 wrote to memory of 388 992 c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe 30 PID 992 wrote to memory of 388 992 c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe 30 PID 388 wrote to memory of 1572 388 cmd.exe 32 PID 388 wrote to memory of 1572 388 cmd.exe 32 PID 388 wrote to memory of 1572 388 cmd.exe 32 PID 388 wrote to memory of 1572 388 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe"C:\Users\Admin\AppData\Local\Temp\c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del c62b78707c36428202251349d95ca42a5c2eeee9d4f75329ed0eaa2fecab59cf.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-