Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe
Resource
win10v2004-20220901-en
General
-
Target
323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe
-
Size
883KB
-
MD5
7987922b75849f9b2b0b17cf302cfbf2
-
SHA1
22ce6807db61cba9a4e3c71a0e2dd10eb1013600
-
SHA256
323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4
-
SHA512
b5ca4f74c95bfdd640b9ba83ca1c5f16120fe9fb6d38f9ea73fd321b7511ed8389b02ae0610222c34643e93c7c4b72a2d5fc17fceadc449530256c80c65c4e88
-
SSDEEP
12288:hjQrFfzQ5bwd4GeziwB+8YpuMQSr4e7lvGjDG59Dh3LA4bwXPQqP5tmgYENiOv:hjl5bwd4X9guMjrLZhDh3KXYO5tmDu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1780 defender.exe -
Loads dropped DLL 3 IoCs
pid Process 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run defender.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security Protection = "C:\\ProgramData\\defender.exe" defender.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: defender.exe File opened (read-only) \??\G: defender.exe File opened (read-only) \??\M: defender.exe File opened (read-only) \??\S: defender.exe File opened (read-only) \??\W: defender.exe File opened (read-only) \??\O: defender.exe File opened (read-only) \??\R: defender.exe File opened (read-only) \??\U: defender.exe File opened (read-only) \??\V: defender.exe File opened (read-only) \??\H: defender.exe File opened (read-only) \??\L: defender.exe File opened (read-only) \??\N: defender.exe File opened (read-only) \??\Q: defender.exe File opened (read-only) \??\T: defender.exe File opened (read-only) \??\Z: defender.exe File opened (read-only) \??\F: defender.exe File opened (read-only) \??\I: defender.exe File opened (read-only) \??\J: defender.exe File opened (read-only) \??\K: defender.exe File opened (read-only) \??\P: defender.exe File opened (read-only) \??\X: defender.exe File opened (read-only) \??\Y: defender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe 1780 defender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1780 defender.exe 1780 defender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1780 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe 28 PID 1628 wrote to memory of 1780 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe 28 PID 1628 wrote to memory of 1780 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe 28 PID 1628 wrote to memory of 1780 1628 323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe"C:\Users\Admin\AppData\Local\Temp\323878df53824cf86708f257e4668c890ef438ffe53604de61d411807f44ffe4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\ProgramData\defender.exeC:\ProgramData\defender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
843KB
MD5d28ad3e494e22192f95bac39762e9776
SHA1dcd61b8783ada347fa532859fdbaf112751a9c15
SHA2567c33939e87dd7f1f5c89d7a71e552ff127a959b5218a38c5e69ca77d015b1cd9
SHA512037baff9cc36874232bab3fda4fc5c7e4c442e17656a1a5f17043d4c953b13f287a0d7c4900d44a8f72ddba77b411c46f5cc657ab1118651206f52ae38ac245c
-
Filesize
843KB
MD5d28ad3e494e22192f95bac39762e9776
SHA1dcd61b8783ada347fa532859fdbaf112751a9c15
SHA2567c33939e87dd7f1f5c89d7a71e552ff127a959b5218a38c5e69ca77d015b1cd9
SHA512037baff9cc36874232bab3fda4fc5c7e4c442e17656a1a5f17043d4c953b13f287a0d7c4900d44a8f72ddba77b411c46f5cc657ab1118651206f52ae38ac245c
-
Filesize
843KB
MD5d28ad3e494e22192f95bac39762e9776
SHA1dcd61b8783ada347fa532859fdbaf112751a9c15
SHA2567c33939e87dd7f1f5c89d7a71e552ff127a959b5218a38c5e69ca77d015b1cd9
SHA512037baff9cc36874232bab3fda4fc5c7e4c442e17656a1a5f17043d4c953b13f287a0d7c4900d44a8f72ddba77b411c46f5cc657ab1118651206f52ae38ac245c
-
Filesize
843KB
MD5d28ad3e494e22192f95bac39762e9776
SHA1dcd61b8783ada347fa532859fdbaf112751a9c15
SHA2567c33939e87dd7f1f5c89d7a71e552ff127a959b5218a38c5e69ca77d015b1cd9
SHA512037baff9cc36874232bab3fda4fc5c7e4c442e17656a1a5f17043d4c953b13f287a0d7c4900d44a8f72ddba77b411c46f5cc657ab1118651206f52ae38ac245c
-
Filesize
843KB
MD5d28ad3e494e22192f95bac39762e9776
SHA1dcd61b8783ada347fa532859fdbaf112751a9c15
SHA2567c33939e87dd7f1f5c89d7a71e552ff127a959b5218a38c5e69ca77d015b1cd9
SHA512037baff9cc36874232bab3fda4fc5c7e4c442e17656a1a5f17043d4c953b13f287a0d7c4900d44a8f72ddba77b411c46f5cc657ab1118651206f52ae38ac245c