Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 13:15

General

  • Target

    e9df3f83ba7ced62c6646240c0f810d4d0d1c48c2294ee5397c8082f7e1994e4.exe

  • Size

    860KB

  • MD5

    a18ae764514efd206b779bdc7c522b6c

  • SHA1

    c24273454e7d1ab4162d78c64c73b77155caa37f

  • SHA256

    e9df3f83ba7ced62c6646240c0f810d4d0d1c48c2294ee5397c8082f7e1994e4

  • SHA512

    8f95712b9ae2243f945c1f570de140fbdf1d9ddc10468973010eabe1a179b3c4c2aa8d23f0798a0239e7bf04d614c4935b884e0c2a8fa76a50c0a68b83582ce5

  • SSDEEP

    12288:4gdLZ77GT7GmYRpuEcutuFY1hGoksq6iTZaAZaWZSZvd9ZEAPRzaO2J5KLY9QRsf:4gLGTpo9qlBAP66ZDGUC

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 3 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9df3f83ba7ced62c6646240c0f810d4d0d1c48c2294ee5397c8082f7e1994e4.exe
    "C:\Users\Admin\AppData\Local\Temp\e9df3f83ba7ced62c6646240c0f810d4d0d1c48c2294ee5397c8082f7e1994e4.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Users\Admin\Wins7\msmm.exe
      C:\Users\Admin\Wins7\msmm.exe /p
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Wins7\msmm.exe

    Filesize

    860KB

    MD5

    68bc9be088e8d0fa9dd1fb296aa3a227

    SHA1

    0996e4c62d3bc6b72969b8ceff5bd1e9a1de4476

    SHA256

    b80659bf1d1c38bc0687f2b8196861f5919299e9a451d58d76bbc3edb4723eb4

    SHA512

    ade941dca44885d5d11397a19515a9ab408317a7827ae4bf32d23e9bf8e789238260580be70a45f1985a1429fceb1a227f5cde366c02a706acc75bb25f3ec063

  • C:\Users\Admin\Wins7\msmm.exe

    Filesize

    860KB

    MD5

    68bc9be088e8d0fa9dd1fb296aa3a227

    SHA1

    0996e4c62d3bc6b72969b8ceff5bd1e9a1de4476

    SHA256

    b80659bf1d1c38bc0687f2b8196861f5919299e9a451d58d76bbc3edb4723eb4

    SHA512

    ade941dca44885d5d11397a19515a9ab408317a7827ae4bf32d23e9bf8e789238260580be70a45f1985a1429fceb1a227f5cde366c02a706acc75bb25f3ec063

  • \Users\Admin\Wins7\msmm.exe

    Filesize

    860KB

    MD5

    68bc9be088e8d0fa9dd1fb296aa3a227

    SHA1

    0996e4c62d3bc6b72969b8ceff5bd1e9a1de4476

    SHA256

    b80659bf1d1c38bc0687f2b8196861f5919299e9a451d58d76bbc3edb4723eb4

    SHA512

    ade941dca44885d5d11397a19515a9ab408317a7827ae4bf32d23e9bf8e789238260580be70a45f1985a1429fceb1a227f5cde366c02a706acc75bb25f3ec063

  • \Users\Admin\Wins7\msmm.exe

    Filesize

    860KB

    MD5

    68bc9be088e8d0fa9dd1fb296aa3a227

    SHA1

    0996e4c62d3bc6b72969b8ceff5bd1e9a1de4476

    SHA256

    b80659bf1d1c38bc0687f2b8196861f5919299e9a451d58d76bbc3edb4723eb4

    SHA512

    ade941dca44885d5d11397a19515a9ab408317a7827ae4bf32d23e9bf8e789238260580be70a45f1985a1429fceb1a227f5cde366c02a706acc75bb25f3ec063

  • \Users\Admin\Wins7\msmm.exe

    Filesize

    860KB

    MD5

    68bc9be088e8d0fa9dd1fb296aa3a227

    SHA1

    0996e4c62d3bc6b72969b8ceff5bd1e9a1de4476

    SHA256

    b80659bf1d1c38bc0687f2b8196861f5919299e9a451d58d76bbc3edb4723eb4

    SHA512

    ade941dca44885d5d11397a19515a9ab408317a7827ae4bf32d23e9bf8e789238260580be70a45f1985a1429fceb1a227f5cde366c02a706acc75bb25f3ec063

  • memory/1000-56-0x0000000076561000-0x0000000076563000-memory.dmp

    Filesize

    8KB

  • memory/1000-66-0x0000000000400000-0x00000000004E7000-memory.dmp

    Filesize

    924KB

  • memory/1000-68-0x0000000000400000-0x00000000004E7000-memory.dmp

    Filesize

    924KB

  • memory/1624-67-0x0000000000400000-0x00000000004E7000-memory.dmp

    Filesize

    924KB