Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe
Resource
win10v2004-20220812-en
General
-
Target
8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe
-
Size
107KB
-
MD5
53c6be20fb600488a5cd27fd7889d8a0
-
SHA1
6e45ad788ab78a163ff0c703b2978d9b172b9447
-
SHA256
8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8
-
SHA512
5e412c93479d3ba3512362d7bb654f5d1f2a516f9d2b42dde2769e43de052979caae93fee52cda8ab70180141a83426abd90948b9a3ad2f25faaa603c42c82ad
-
SSDEEP
1536:1PHPU4oh4BGCSer10tmisnifh4Vdnr0Ru9D8vujqHJM7f70/tF5Ug+QZspt:1Pvhrhr1mmzr0Ruy75UKWf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2024 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1972 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1972 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1532 8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2024 1532 8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe 28 PID 1532 wrote to memory of 2024 1532 8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe 28 PID 1532 wrote to memory of 2024 1532 8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe 28 PID 1532 wrote to memory of 2024 1532 8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe 28 PID 2024 wrote to memory of 1972 2024 cmd.exe 29 PID 2024 wrote to memory of 1972 2024 cmd.exe 29 PID 2024 wrote to memory of 1972 2024 cmd.exe 29 PID 2024 wrote to memory of 1972 2024 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe"C:\Users\Admin\AppData\Local\Temp\8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 8a4c1df1ac7b6cdf15fdade5e197d59b0ee4c781c5028111c3901b30fc8f79a8.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-