Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
General
-
Target
tmp.exe
-
Size
292KB
-
MD5
010127f3cf0f5ab066c3264e423a33f3
-
SHA1
e77d2f9799832f6f98269e6d1e8a88ba95a74a7d
-
SHA256
f17d7c6a4166bae48178a63da35f72da8e73f7e696d2e87e1eba3c9e3df33f42
-
SHA512
3358fa87cd5fff14da9aa503873e4abfef8c03c510782dae852c63246c30c0640bcb24d9d7d50c5bb0d302d17097a4b61fa7cbe1cc3b97343cc1f1c5fca503b0
-
SSDEEP
6144:8anKdq2HmrYFHkEr2SuNW8E1koxoJStR:8/dx8YFGSuNW8EyVc
Malware Config
Extracted
vidar
54.7
1663
https://t.me/trampapanam
https://nerdculture.de/@yoxhyp
-
profile_id
1663
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 792 53737000846433542163.exe -
Loads dropped DLL 7 IoCs
pid Process 2016 aspnet_compiler.exe 2016 aspnet_compiler.exe 2016 aspnet_compiler.exe 2016 aspnet_compiler.exe 2016 aspnet_compiler.exe 792 53737000846433542163.exe 792 53737000846433542163.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 2016 2032 tmp.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aspnet_compiler.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString aspnet_compiler.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1652 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1912 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2016 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1912 taskkill.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2032 wrote to memory of 2016 2032 tmp.exe 27 PID 2016 wrote to memory of 792 2016 aspnet_compiler.exe 30 PID 2016 wrote to memory of 792 2016 aspnet_compiler.exe 30 PID 2016 wrote to memory of 792 2016 aspnet_compiler.exe 30 PID 2016 wrote to memory of 792 2016 aspnet_compiler.exe 30 PID 2016 wrote to memory of 828 2016 aspnet_compiler.exe 31 PID 2016 wrote to memory of 828 2016 aspnet_compiler.exe 31 PID 2016 wrote to memory of 828 2016 aspnet_compiler.exe 31 PID 2016 wrote to memory of 828 2016 aspnet_compiler.exe 31 PID 828 wrote to memory of 1912 828 cmd.exe 33 PID 828 wrote to memory of 1912 828 cmd.exe 33 PID 828 wrote to memory of 1912 828 cmd.exe 33 PID 828 wrote to memory of 1912 828 cmd.exe 33 PID 828 wrote to memory of 1652 828 cmd.exe 35 PID 828 wrote to memory of 1652 828 cmd.exe 35 PID 828 wrote to memory of 1652 828 cmd.exe 35 PID 828 wrote to memory of 1652 828 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\ProgramData\53737000846433542163.exe"C:\ProgramData\53737000846433542163.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" ìM/c taskkill /im aspnet_compiler.exe /f & timeout /t 6 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" & del C:\PrograData\*.dll & exit3⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im aspnet_compiler.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1652
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53.1MB
MD59169ea8679cdebf702fd499d96853c32
SHA15261c476050bff49ecf8340dc10527de303cfe3e
SHA256d1ea56128b7b0fe5093d6778cec2ffd20ddf6fae3183b68e07fc1cbfc9468ade
SHA5120b6e03417e2c77e7ee3631f4a82a36fa4681e8c4b217c2a9f6dc0c889515db44fa4b452d0b7c324f6a731f1a50b750da3e4bc0d2d3636ab8182cf5127aaa44e1
-
Filesize
53.1MB
MD59169ea8679cdebf702fd499d96853c32
SHA15261c476050bff49ecf8340dc10527de303cfe3e
SHA256d1ea56128b7b0fe5093d6778cec2ffd20ddf6fae3183b68e07fc1cbfc9468ade
SHA5120b6e03417e2c77e7ee3631f4a82a36fa4681e8c4b217c2a9f6dc0c889515db44fa4b452d0b7c324f6a731f1a50b750da3e4bc0d2d3636ab8182cf5127aaa44e1
-
Filesize
53.1MB
MD59169ea8679cdebf702fd499d96853c32
SHA15261c476050bff49ecf8340dc10527de303cfe3e
SHA256d1ea56128b7b0fe5093d6778cec2ffd20ddf6fae3183b68e07fc1cbfc9468ade
SHA5120b6e03417e2c77e7ee3631f4a82a36fa4681e8c4b217c2a9f6dc0c889515db44fa4b452d0b7c324f6a731f1a50b750da3e4bc0d2d3636ab8182cf5127aaa44e1
-
Filesize
53.1MB
MD59169ea8679cdebf702fd499d96853c32
SHA15261c476050bff49ecf8340dc10527de303cfe3e
SHA256d1ea56128b7b0fe5093d6778cec2ffd20ddf6fae3183b68e07fc1cbfc9468ade
SHA5120b6e03417e2c77e7ee3631f4a82a36fa4681e8c4b217c2a9f6dc0c889515db44fa4b452d0b7c324f6a731f1a50b750da3e4bc0d2d3636ab8182cf5127aaa44e1
-
Filesize
53.1MB
MD59169ea8679cdebf702fd499d96853c32
SHA15261c476050bff49ecf8340dc10527de303cfe3e
SHA256d1ea56128b7b0fe5093d6778cec2ffd20ddf6fae3183b68e07fc1cbfc9468ade
SHA5120b6e03417e2c77e7ee3631f4a82a36fa4681e8c4b217c2a9f6dc0c889515db44fa4b452d0b7c324f6a731f1a50b750da3e4bc0d2d3636ab8182cf5127aaa44e1
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
5KB
MD508de81a4584f5201086f57a7a93ed83b
SHA1266a6ecc8fb7dca115e6915cd75e2595816841a8
SHA2564883cd4231744be2dca4433ef62824b7957a3c16be54f8526270402d9413ebe6
SHA512b72e7cea5ce1f4dc64e65a1f683a3ef9e3fa2dc45cf421f569eb461f1fdcc0caf4ff62a872e62b400579f567c6ff9fc3c2e6e020cdca89d96015502c803a09b9
-
Filesize
9KB
MD5ca5bb0ee2b698869c41c087c9854487c
SHA14a8abbb2544f1a9555e57a142a147dfeb40c4ca4
SHA256c719697d5ced17d97bbc48662327339ccec7e03f6552aa1d5c248f6fa5f16324
SHA512363a80843d7601ba119bc981c4346188f490b388e3ed390a0667aaf5138b885eec6c69d4e7f60f93b069d6550277f4c926bd0f37bc893928111dc62494124770