Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 19:50 UTC
Static task
static1
Behavioral task
behavioral1
Sample
9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe
Resource
win7-20220812-en
General
-
Target
9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe
-
Size
778KB
-
MD5
25accfd0d7139098d353b62890c9dbd0
-
SHA1
9e2124ad99d677bd6835b9b61dffee452a3ea0ee
-
SHA256
9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb
-
SHA512
e874c15d8840b1c1c880113fd9cca109097bcfaa8f2fa7a500513ba044ed869d3d9e4c1be223715b022207009363567d35593c8d0ae881078771844540a41baf
-
SSDEEP
24576:l8VCKdZcTU8dLJJ+0JxCUdcNQ/1z7ktahL:l8V+wELj+0LyNIL
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000d0000000054a8-69.dat aspack_v212_v242 behavioral1/files/0x000d0000000054a8-72.dat aspack_v212_v242 behavioral1/files/0x000d0000000054a8-74.dat aspack_v212_v242 behavioral1/files/0x000d0000000054a8-70.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 1048 run.exe 1520 b2e.exe 1196 logo.exe 656 trans.exe -
resource yara_rule behavioral1/files/0x000b0000000122ff-55.dat upx behavioral1/files/0x000b0000000122ff-56.dat upx behavioral1/files/0x000b0000000122ff-58.dat upx behavioral1/memory/1048-65-0x0000000000400000-0x00000000004BF000-memory.dmp upx -
Loads dropped DLL 7 IoCs
pid Process 1692 9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe 1692 9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe 1048 run.exe 1048 run.exe 1500 cmd.exe 1500 cmd.exe 1500 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1112 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1112 AUDIODG.EXE Token: 33 1112 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1112 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1048 1692 9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe 27 PID 1692 wrote to memory of 1048 1692 9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe 27 PID 1692 wrote to memory of 1048 1692 9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe 27 PID 1692 wrote to memory of 1048 1692 9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe 27 PID 1048 wrote to memory of 1520 1048 run.exe 28 PID 1048 wrote to memory of 1520 1048 run.exe 28 PID 1048 wrote to memory of 1520 1048 run.exe 28 PID 1048 wrote to memory of 1520 1048 run.exe 28 PID 1520 wrote to memory of 1500 1520 b2e.exe 29 PID 1520 wrote to memory of 1500 1520 b2e.exe 29 PID 1520 wrote to memory of 1500 1520 b2e.exe 29 PID 1520 wrote to memory of 1500 1520 b2e.exe 29 PID 1500 wrote to memory of 1196 1500 cmd.exe 31 PID 1500 wrote to memory of 1196 1500 cmd.exe 31 PID 1500 wrote to memory of 1196 1500 cmd.exe 31 PID 1500 wrote to memory of 1196 1500 cmd.exe 31 PID 1500 wrote to memory of 656 1500 cmd.exe 33 PID 1500 wrote to memory of 656 1500 cmd.exe 33 PID 1500 wrote to memory of 656 1500 cmd.exe 33 PID 1500 wrote to memory of 656 1500 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe"C:\Users\Admin\AppData\Local\Temp\9958b608a40403411d6ddbd68a17435078f686ad6e473b62e4dabbab31531cdb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\WINDOWS\Temp\run.exe"C:\WINDOWS\Temp\run.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\7AFB.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\7AFB.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\7AFB.tmp\b2e.exe C:\WINDOWS\Temp "C:\WINDOWS\Temp\run.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7C33.tmp\batfile.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\WINDOWS\Temp\logo.exeC:\WINDOWS\Temp\logo.exe5⤵
- Executes dropped EXE
PID:1196
-
-
C:\WINDOWS\Temp\trans.exeC:\WINDOWS\Temp\trans.exe5⤵
- Executes dropped EXE
PID:656
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5581⤵
- Suspicious use of AdjustPrivilegeToken
PID:1112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b59836f8bce4b7a9c5c44bd3d77bbc05
SHA1deef3c038817d8af51ebae1c9b547bdeafe90500
SHA25682b620227e2ff4eecdc396367ef3cd090db387d5fa9c28be98296892acbe0952
SHA512ba329fecfd4367fdc26b9daa3974e62d27b4763d850f182246ad2f27f8dcb445ec803b576d617d93881d774f2b19a437fef0909c8a637ec9fc2b3380113095d6
-
Filesize
8KB
MD5b59836f8bce4b7a9c5c44bd3d77bbc05
SHA1deef3c038817d8af51ebae1c9b547bdeafe90500
SHA25682b620227e2ff4eecdc396367ef3cd090db387d5fa9c28be98296892acbe0952
SHA512ba329fecfd4367fdc26b9daa3974e62d27b4763d850f182246ad2f27f8dcb445ec803b576d617d93881d774f2b19a437fef0909c8a637ec9fc2b3380113095d6
-
Filesize
158B
MD52ebd35710cdf46a6bfc1b7a9a573e991
SHA1c52403395a0b51b50cd550e97d8cc260605bc873
SHA25652ca6a8fe69ab59ca99b72500f5a9baadbe277ca0dea6dd8462acb322678a146
SHA512d2907d3fe5c3c44f8fb08e233671a9cf268f647e9cd7780c46b3db7afe74b5c59a410ac4993dd5e5a928b6dc5e95d31e6bebc34e1bf9746b6dab6283d798ea8f
-
Filesize
539KB
MD51193331f68ce9016cafae71284453d75
SHA11bdc6d8d9b7f958bc113a1793c367a41a4f6dac1
SHA2562962140fb8b1ab340f5d76813aec9fbc79cd8f3ea389407c5ed5597551d2125f
SHA5124075a8aa2feec57cc040bf51d228d42b0d36ad3870a94889d84f0a87b1b610bc90e7f5bbdc5a40bb1ab419fffa6ae9c922c4bd97901c395a09784bd30b393928
-
Filesize
178KB
MD58fdd8d2ab15c3bd9977bb212c8611af4
SHA1bce49aa7c995311ba9eee6ca9da92163b37f2f50
SHA256b3a9e24e5b449a7124efe8c707c8bfb71b7c604ff53cff1da8eba8ef4c7fe3ad
SHA51281623b08b256653ba5f902ed315766c55dfc4cf340990e38ecdad76e7c04a145f0942ea79c1bfbeb214e4b59e248de938c716a1bc9b3c309db0b482187a04934
-
Filesize
539KB
MD51193331f68ce9016cafae71284453d75
SHA11bdc6d8d9b7f958bc113a1793c367a41a4f6dac1
SHA2562962140fb8b1ab340f5d76813aec9fbc79cd8f3ea389407c5ed5597551d2125f
SHA5124075a8aa2feec57cc040bf51d228d42b0d36ad3870a94889d84f0a87b1b610bc90e7f5bbdc5a40bb1ab419fffa6ae9c922c4bd97901c395a09784bd30b393928
-
Filesize
370KB
MD5633b2db9da9af8ce7f6c14acbd24770a
SHA17c6d4fc0cddb0213fc98421167f75e5d7afe27fe
SHA2569638581a59653c0d6f01110be90cfaf13b15ab91b3839ee9d46dce33f26e6a2b
SHA512fac63132db6d52d55c10618dac00f3b4ffe7cc1ddc5284dd90da5e24f447366273aea7712590ab36a2f243535e7c095c4b29bef9f6ba54db4b3993ee55a52172
-
Filesize
178KB
MD58fdd8d2ab15c3bd9977bb212c8611af4
SHA1bce49aa7c995311ba9eee6ca9da92163b37f2f50
SHA256b3a9e24e5b449a7124efe8c707c8bfb71b7c604ff53cff1da8eba8ef4c7fe3ad
SHA51281623b08b256653ba5f902ed315766c55dfc4cf340990e38ecdad76e7c04a145f0942ea79c1bfbeb214e4b59e248de938c716a1bc9b3c309db0b482187a04934
-
Filesize
8KB
MD5b59836f8bce4b7a9c5c44bd3d77bbc05
SHA1deef3c038817d8af51ebae1c9b547bdeafe90500
SHA25682b620227e2ff4eecdc396367ef3cd090db387d5fa9c28be98296892acbe0952
SHA512ba329fecfd4367fdc26b9daa3974e62d27b4763d850f182246ad2f27f8dcb445ec803b576d617d93881d774f2b19a437fef0909c8a637ec9fc2b3380113095d6
-
Filesize
8KB
MD5b59836f8bce4b7a9c5c44bd3d77bbc05
SHA1deef3c038817d8af51ebae1c9b547bdeafe90500
SHA25682b620227e2ff4eecdc396367ef3cd090db387d5fa9c28be98296892acbe0952
SHA512ba329fecfd4367fdc26b9daa3974e62d27b4763d850f182246ad2f27f8dcb445ec803b576d617d93881d774f2b19a437fef0909c8a637ec9fc2b3380113095d6
-
Filesize
539KB
MD51193331f68ce9016cafae71284453d75
SHA11bdc6d8d9b7f958bc113a1793c367a41a4f6dac1
SHA2562962140fb8b1ab340f5d76813aec9fbc79cd8f3ea389407c5ed5597551d2125f
SHA5124075a8aa2feec57cc040bf51d228d42b0d36ad3870a94889d84f0a87b1b610bc90e7f5bbdc5a40bb1ab419fffa6ae9c922c4bd97901c395a09784bd30b393928
-
Filesize
539KB
MD51193331f68ce9016cafae71284453d75
SHA11bdc6d8d9b7f958bc113a1793c367a41a4f6dac1
SHA2562962140fb8b1ab340f5d76813aec9fbc79cd8f3ea389407c5ed5597551d2125f
SHA5124075a8aa2feec57cc040bf51d228d42b0d36ad3870a94889d84f0a87b1b610bc90e7f5bbdc5a40bb1ab419fffa6ae9c922c4bd97901c395a09784bd30b393928
-
Filesize
370KB
MD5633b2db9da9af8ce7f6c14acbd24770a
SHA17c6d4fc0cddb0213fc98421167f75e5d7afe27fe
SHA2569638581a59653c0d6f01110be90cfaf13b15ab91b3839ee9d46dce33f26e6a2b
SHA512fac63132db6d52d55c10618dac00f3b4ffe7cc1ddc5284dd90da5e24f447366273aea7712590ab36a2f243535e7c095c4b29bef9f6ba54db4b3993ee55a52172
-
Filesize
370KB
MD5633b2db9da9af8ce7f6c14acbd24770a
SHA17c6d4fc0cddb0213fc98421167f75e5d7afe27fe
SHA2569638581a59653c0d6f01110be90cfaf13b15ab91b3839ee9d46dce33f26e6a2b
SHA512fac63132db6d52d55c10618dac00f3b4ffe7cc1ddc5284dd90da5e24f447366273aea7712590ab36a2f243535e7c095c4b29bef9f6ba54db4b3993ee55a52172
-
Filesize
178KB
MD58fdd8d2ab15c3bd9977bb212c8611af4
SHA1bce49aa7c995311ba9eee6ca9da92163b37f2f50
SHA256b3a9e24e5b449a7124efe8c707c8bfb71b7c604ff53cff1da8eba8ef4c7fe3ad
SHA51281623b08b256653ba5f902ed315766c55dfc4cf340990e38ecdad76e7c04a145f0942ea79c1bfbeb214e4b59e248de938c716a1bc9b3c309db0b482187a04934