Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    156s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 14:16

General

  • Target

    16bcbe22b0e671c478bb092bdb22f43a811a06d1e101c3e3428243849e1da6b9.exe

  • Size

    206KB

  • MD5

    7b6610873a942a19ac3e87417d608122

  • SHA1

    aa9f84ebef971e394f994a45367ca3e3f0309e99

  • SHA256

    16bcbe22b0e671c478bb092bdb22f43a811a06d1e101c3e3428243849e1da6b9

  • SHA512

    218e07927a305a0bc1c5379e0e7dd05ae029465317c5866564eb7b2d541d22528cb94ac54339dffd8f19ceeab02c32f333b49198d1b75dfba6a8836989d3ef6f

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unpC:zvEN2U+T6i5LirrllHy4HUcMQY6UC

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16bcbe22b0e671c478bb092bdb22f43a811a06d1e101c3e3428243849e1da6b9.exe
    "C:\Users\Admin\AppData\Local\Temp\16bcbe22b0e671c478bb092bdb22f43a811a06d1e101c3e3428243849e1da6b9.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4364
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4132
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:532
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:5016
          • C:\Windows\SysWOW64\at.exe
            at 16:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:3596
            • C:\Windows\SysWOW64\at.exe
              at 16:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:3720
              • C:\Windows\SysWOW64\at.exe
                at 16:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2620

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          207KB

          MD5

          0ea38632f8bec2b8ebc79f47c6555a68

          SHA1

          3fa2dbc69ab4e623b3002d16d1643dc83bfa522e

          SHA256

          832ba2c6cd7efbef55ffa1a81afbff8454ecbd4d24d6451f577d40ffdd3a1fb1

          SHA512

          81a7841f725394b9747ad65b442b49ff28e48516d314d09ec5c210a51997ea8a86ce64263350d373e0ed346989be2a961ed4823f44bb2593d641e98ef7f473b5

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          032d1a428263b10f8661776b6d146d6f

          SHA1

          f6782a23b92e700f5399f0fa35d59fda1ec2cb86

          SHA256

          3edbc9fc65fc2972f38aeee91b5fe531cd6da5ffe141991551a320c269e8d40c

          SHA512

          d8a0c2c8e03e44d66dbefac79f8ad009267d56f25f524d7fee97038e072c38b3b60fb6618e3bf606e2982f3db288661e411cefd2f6a2ba558f3e28ef1b39479e

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          ce2be5d81b1ad3a143f497d28f4a8a26

          SHA1

          920b7621316876b29dce06bf4d208a091e533fb9

          SHA256

          197175200792c1d5571f8e53a7a2016fb8a964e2aa5b709bc666f19c2d4b4b2b

          SHA512

          57cde727100fc107f7657683ed4ea45ebe993a0f1fdd05a0d61bbc02714a5e7602e62669d1343882a2d796a419a2b1b45b754b8b9b728c06746e5248ab690a64

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          ce2be5d81b1ad3a143f497d28f4a8a26

          SHA1

          920b7621316876b29dce06bf4d208a091e533fb9

          SHA256

          197175200792c1d5571f8e53a7a2016fb8a964e2aa5b709bc666f19c2d4b4b2b

          SHA512

          57cde727100fc107f7657683ed4ea45ebe993a0f1fdd05a0d61bbc02714a5e7602e62669d1343882a2d796a419a2b1b45b754b8b9b728c06746e5248ab690a64

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          143ea5d1e62127b3ccd638e91493c3ad

          SHA1

          4aa7e936f67043fcb7c5cda13badfdb5a7241e1d

          SHA256

          2195a0feb16fa07b5df9ed16a72951e88f816572ff1b7f3b2f16fe39ea66a9b7

          SHA512

          50bd5207b8865f5101c33eafe540d8658754b74ba53999749019569c6f84c4d271b1a091ca56522989c0b9460e9792529cebcbd21a2d1321dae56b651a2c4774

        • \??\c:\windows\system\explorer.exe

          Filesize

          206KB

          MD5

          032d1a428263b10f8661776b6d146d6f

          SHA1

          f6782a23b92e700f5399f0fa35d59fda1ec2cb86

          SHA256

          3edbc9fc65fc2972f38aeee91b5fe531cd6da5ffe141991551a320c269e8d40c

          SHA512

          d8a0c2c8e03e44d66dbefac79f8ad009267d56f25f524d7fee97038e072c38b3b60fb6618e3bf606e2982f3db288661e411cefd2f6a2ba558f3e28ef1b39479e

        • \??\c:\windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          ce2be5d81b1ad3a143f497d28f4a8a26

          SHA1

          920b7621316876b29dce06bf4d208a091e533fb9

          SHA256

          197175200792c1d5571f8e53a7a2016fb8a964e2aa5b709bc666f19c2d4b4b2b

          SHA512

          57cde727100fc107f7657683ed4ea45ebe993a0f1fdd05a0d61bbc02714a5e7602e62669d1343882a2d796a419a2b1b45b754b8b9b728c06746e5248ab690a64

        • \??\c:\windows\system\svchost.exe

          Filesize

          206KB

          MD5

          143ea5d1e62127b3ccd638e91493c3ad

          SHA1

          4aa7e936f67043fcb7c5cda13badfdb5a7241e1d

          SHA256

          2195a0feb16fa07b5df9ed16a72951e88f816572ff1b7f3b2f16fe39ea66a9b7

          SHA512

          50bd5207b8865f5101c33eafe540d8658754b74ba53999749019569c6f84c4d271b1a091ca56522989c0b9460e9792529cebcbd21a2d1321dae56b651a2c4774