Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 14:31 UTC
Static task
static1
Behavioral task
behavioral1
Sample
97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe
Resource
win10v2004-20220901-en
General
-
Target
97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe
-
Size
72KB
-
MD5
6a66342fc974b506d4316fd56b2c3d60
-
SHA1
144fc7eab428173a2488dcafc72749c4cf6123aa
-
SHA256
97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b
-
SHA512
88e245cb8418d888167a5545762b9617f3022804e2292f2396e61dc4b8c178891e56ebb03dfbf2680a335dd4fad1c6181444b548b7018331208566047b5e8bb7
-
SSDEEP
1536:ZphbisPfQAaBLsNlP0ufZxKKKKKKKKKRL:pdPYoPjfZU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1416 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1432 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1432 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1872 97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1416 1872 97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe 28 PID 1872 wrote to memory of 1416 1872 97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe 28 PID 1872 wrote to memory of 1416 1872 97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe 28 PID 1872 wrote to memory of 1416 1872 97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe 28 PID 1416 wrote to memory of 1432 1416 cmd.exe 30 PID 1416 wrote to memory of 1432 1416 cmd.exe 30 PID 1416 wrote to memory of 1432 1416 cmd.exe 30 PID 1416 wrote to memory of 1432 1416 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe"C:\Users\Admin\AppData\Local\Temp\97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 97cfd4090d84b9ec08d5daec2da0c539249ba2ba226e45e060a596e0dacc897b.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
Network
-
Remote address:8.8.8.8:53Requestdomai.1noip.netIN AResponse