Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 12:57

General

  • Target

    fa6796a144baa096092ec1d01ffc192ab0c7480721f9c683405b00e9f2052bde.exe

  • Size

    212KB

  • MD5

    910839cb6b172870dcf2e6f91b573f19

  • SHA1

    e681db75bd71c4c4a028c68b97409bd21fc24be4

  • SHA256

    fa6796a144baa096092ec1d01ffc192ab0c7480721f9c683405b00e9f2052bde

  • SHA512

    37ca95e3b75f57925d79f6a5d994e138771768eaee782f9c9d918f64c041517f8e832257a4c16b2e9882e8b86de123844747d5ebd8fe6d0b9af7ebeebbb5084e

  • SSDEEP

    1536:Gx0ZFRldoIXG/CRYlI4cd9Lv2PElgWzNoN274B/K51ptaHElfTczpyFar2/AgAIK:+WR/oI1qGp+aNoN2N0YAcXHi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa6796a144baa096092ec1d01ffc192ab0c7480721f9c683405b00e9f2052bde.exe
    "C:\Users\Admin\AppData\Local\Temp\fa6796a144baa096092ec1d01ffc192ab0c7480721f9c683405b00e9f2052bde.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\suejo.exe
      "C:\Users\Admin\suejo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\suejo.exe

    Filesize

    212KB

    MD5

    024d939fbda4e9dbdaa358282c852eb0

    SHA1

    a5379566a4b86d9fdde1b7246fef6f6057978425

    SHA256

    835c9f7a3fdfe5fe443b652043f139553ab9bf7ebf96f8978881c4d7a01758ff

    SHA512

    be544381a7b2be4749f0849bfcdc8683f189d4b6fb36f2ba8d66bcc83cc92c240b7f79e7bf89f5792ceddac57311cf7f6b0eab5caacce14e1b1888a9f16285a5

  • C:\Users\Admin\suejo.exe

    Filesize

    212KB

    MD5

    024d939fbda4e9dbdaa358282c852eb0

    SHA1

    a5379566a4b86d9fdde1b7246fef6f6057978425

    SHA256

    835c9f7a3fdfe5fe443b652043f139553ab9bf7ebf96f8978881c4d7a01758ff

    SHA512

    be544381a7b2be4749f0849bfcdc8683f189d4b6fb36f2ba8d66bcc83cc92c240b7f79e7bf89f5792ceddac57311cf7f6b0eab5caacce14e1b1888a9f16285a5

  • \Users\Admin\suejo.exe

    Filesize

    212KB

    MD5

    024d939fbda4e9dbdaa358282c852eb0

    SHA1

    a5379566a4b86d9fdde1b7246fef6f6057978425

    SHA256

    835c9f7a3fdfe5fe443b652043f139553ab9bf7ebf96f8978881c4d7a01758ff

    SHA512

    be544381a7b2be4749f0849bfcdc8683f189d4b6fb36f2ba8d66bcc83cc92c240b7f79e7bf89f5792ceddac57311cf7f6b0eab5caacce14e1b1888a9f16285a5

  • \Users\Admin\suejo.exe

    Filesize

    212KB

    MD5

    024d939fbda4e9dbdaa358282c852eb0

    SHA1

    a5379566a4b86d9fdde1b7246fef6f6057978425

    SHA256

    835c9f7a3fdfe5fe443b652043f139553ab9bf7ebf96f8978881c4d7a01758ff

    SHA512

    be544381a7b2be4749f0849bfcdc8683f189d4b6fb36f2ba8d66bcc83cc92c240b7f79e7bf89f5792ceddac57311cf7f6b0eab5caacce14e1b1888a9f16285a5

  • memory/2012-56-0x0000000075281000-0x0000000075283000-memory.dmp

    Filesize

    8KB