Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe
Resource
win10v2004-20220901-en
General
-
Target
4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe
-
Size
48KB
-
MD5
a1a7f36c3b0d7ad6218456fe6541d050
-
SHA1
b2e033a6d29ade282feba036dcd6cf3d15c9fb34
-
SHA256
4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a
-
SHA512
6b75257be9b975ca403e0ee25136d0af0ca24890edca14acdc39ac98da29f46b023586194d1bd9e9fa539fcd3ee76ebf357047e0c457c84cc9e1248975468506
-
SSDEEP
768:2C1JqcBnOR7NTgb2UHtaZH6yDC9VavyOAVx8:2CFKVgBqCWvDox8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1528 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1272 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1272 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1380 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1528 1380 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe 28 PID 1380 wrote to memory of 1528 1380 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe 28 PID 1380 wrote to memory of 1528 1380 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe 28 PID 1380 wrote to memory of 1528 1380 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe 28 PID 1528 wrote to memory of 1272 1528 cmd.exe 30 PID 1528 wrote to memory of 1272 1528 cmd.exe 30 PID 1528 wrote to memory of 1272 1528 cmd.exe 30 PID 1528 wrote to memory of 1272 1528 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe"C:\Users\Admin\AppData\Local\Temp\4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 4fb87e41ca91094ad1de146e5d53e65870fd7ade571f79cea28b11ee6aebaa5a.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-