Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 11:03 UTC

General

  • Target

    357b784443bc36daa16210bcf96303b34ffc4ff6db6f69c0b3949fe769eab950.exe

  • Size

    15.0MB

  • MD5

    ce3b36620a2f34e844fc0f22847455e6

  • SHA1

    852913d58dc8cf283ad554c1c227b7039b8532da

  • SHA256

    357b784443bc36daa16210bcf96303b34ffc4ff6db6f69c0b3949fe769eab950

  • SHA512

    73e3335b19263b7b0c6a90a874a114e662102fc2bdfd00e09ff3a0d6136b93fa4c8de50ab635cb6c72bbfb22620c9e17d77098c17024f56a6ea7fedc58548c37

  • SSDEEP

    98304:OLu1g9ZGl52dqV33xAhe2c9DuFJswsDBBqa2ZZzRTC0rBC3FO:Od9s2cxAjAiJsBDBBYFTC0rBC3s

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\357b784443bc36daa16210bcf96303b34ffc4ff6db6f69c0b3949fe769eab950.exe
    "C:\Users\Admin\AppData\Local\Temp\357b784443bc36daa16210bcf96303b34ffc4ff6db6f69c0b3949fe769eab950.exe"
    1⤵
    • Drops startup file
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet && wmic shadowcopy delete
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:276
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1280
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C echo ^[autorun^] >autorun.inf
      2⤵
      • Drops autorun.inf file
      PID:364
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C echo ^open^=KasperskyScan^.exe >>autorun.inf
      2⤵
      • Drops autorun.inf file
      PID:540
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C echo ^execute=^KasperskyScan^.exe >>autorun.inf
      2⤵
      • Drops autorun.inf file
      PID:1656
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autorun.inf

    Filesize

    37B

    MD5

    3883f693b2911e7b9cabaf1d89601ebd

    SHA1

    a733bc5b66e5b7beb1ab54ce430ff16cdb935fcb

    SHA256

    747ea7ec54ee0bc9b637867de0c451df65c840f757988f5a3b6e3fe6c73ab1b6

    SHA512

    41fb0555004f392f2c67fd7675d2aea2a7a28a4f51d92237fdaff2d60624c559a5401335887b66f49a721dff669f8f9bd150fde0afe0845eb366309ca1088a98

  • C:\Users\Admin\AppData\Local\Temp\autorun.inf

    Filesize

    65B

    MD5

    fbefa88e6b51c05dd63d97dfdbeb3589

    SHA1

    67e09918d878c6615befab5dc9194439027f268d

    SHA256

    3861acedffd29452d2fdb96728f7347652bde9353915d3873a7414843f49b8b1

    SHA512

    58f8c1a64f2eb21be7b96db335d1ade0ce0878566a8386b3689b650132ca28e14761b20fdfe50f2af9915dff2bdd3a5b07f6f3ed082e4e6998ec5f0cd052f12f

  • C:\Users\Admin\AppData\Local\Temp\autorun.inf

    Filesize

    65B

    MD5

    fbefa88e6b51c05dd63d97dfdbeb3589

    SHA1

    67e09918d878c6615befab5dc9194439027f268d

    SHA256

    3861acedffd29452d2fdb96728f7347652bde9353915d3873a7414843f49b8b1

    SHA512

    58f8c1a64f2eb21be7b96db335d1ade0ce0878566a8386b3689b650132ca28e14761b20fdfe50f2af9915dff2bdd3a5b07f6f3ed082e4e6998ec5f0cd052f12f

  • memory/2032-54-0x00000000009E0000-0x00000000009E8000-memory.dmp

    Filesize

    32KB

  • memory/2032-55-0x0000000076031000-0x0000000076033000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.