Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe
Resource
win10v2004-20220812-en
General
-
Target
d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe
-
Size
65KB
-
MD5
7aac842cdde3dc19f760ebade60395c0
-
SHA1
d306b61b4568788fc5977736fa60db983a9ccf49
-
SHA256
d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f
-
SHA512
b193a155bc83b6d66de17939a9d5829a717b34e3a5e848a9a4ff1f9235a3ac3b3d9f9ced3b8f64b018039b1233c81f74cd386d1fa6851675f2acaf0e49ac33c0
-
SSDEEP
768:MgJ/HEdRbAY0iUNvDvdtvfdeebD+Tq/QwIt0L06WRR373nMle29+I4U+CZC:MgeSnxSs+Tq/Qw106S73nMlfPRY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1728 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2008 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2008 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2016 d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1728 2016 d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe 27 PID 2016 wrote to memory of 1728 2016 d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe 27 PID 2016 wrote to memory of 1728 2016 d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe 27 PID 2016 wrote to memory of 1728 2016 d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe 27 PID 1728 wrote to memory of 2008 1728 cmd.exe 29 PID 1728 wrote to memory of 2008 1728 cmd.exe 29 PID 1728 wrote to memory of 2008 1728 cmd.exe 29 PID 1728 wrote to memory of 2008 1728 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe"C:\Users\Admin\AppData\Local\Temp\d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del d75b4bfaad82621fdd42ec96becc50f47627c425b285d64df273f11b624e3c8f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-