Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15/10/2022, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
f9482bb02601f897d980e64e4b54fe3c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9482bb02601f897d980e64e4b54fe3c.exe
Resource
win10v2004-20220812-en
General
-
Target
f9482bb02601f897d980e64e4b54fe3c.exe
-
Size
10KB
-
MD5
f9482bb02601f897d980e64e4b54fe3c
-
SHA1
bbaf763d8b26f468f6d4fb5cb631e3fedb3c965b
-
SHA256
a20d62110e3e9d2659ee55299033ff3542bdce0b669f299dad18dddce4ddc1af
-
SHA512
f0b2dcb4403d6b709a327fdf3533ff80272ccf4618e094fa7727564d0f47cf83cff2568615c331062c4b21fa21755b62c88acea466ac96627aeba120244a9d6d
-
SSDEEP
192:ZBlbXZH5KcyeRrUt0cgh8/2PnH/7AvBp:ZBkurM05S/2vHzM
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 532 set thread context of 1372 532 f9482bb02601f897d980e64e4b54fe3c.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2024 powershell.exe 532 f9482bb02601f897d980e64e4b54fe3c.exe 532 f9482bb02601f897d980e64e4b54fe3c.exe 1372 AppLaunch.exe 1372 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 532 f9482bb02601f897d980e64e4b54fe3c.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 1372 AppLaunch.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 532 wrote to memory of 2024 532 f9482bb02601f897d980e64e4b54fe3c.exe 27 PID 532 wrote to memory of 2024 532 f9482bb02601f897d980e64e4b54fe3c.exe 27 PID 532 wrote to memory of 2024 532 f9482bb02601f897d980e64e4b54fe3c.exe 27 PID 532 wrote to memory of 1372 532 f9482bb02601f897d980e64e4b54fe3c.exe 29 PID 532 wrote to memory of 1372 532 f9482bb02601f897d980e64e4b54fe3c.exe 29 PID 532 wrote to memory of 1372 532 f9482bb02601f897d980e64e4b54fe3c.exe 29 PID 532 wrote to memory of 1372 532 f9482bb02601f897d980e64e4b54fe3c.exe 29 PID 532 wrote to memory of 1372 532 f9482bb02601f897d980e64e4b54fe3c.exe 29 PID 532 wrote to memory of 1372 532 f9482bb02601f897d980e64e4b54fe3c.exe 29 PID 532 wrote to memory of 1372 532 f9482bb02601f897d980e64e4b54fe3c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9482bb02601f897d980e64e4b54fe3c.exe"C:\Users\Admin\AppData\Local\Temp\f9482bb02601f897d980e64e4b54fe3c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-