Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
Calculation.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Calculation.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
vertices/asteroidal.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
vertices/asteroidal.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
vertices/bombshell.dll
Resource
win7-20220901-en
General
-
Target
Calculation.lnk
-
Size
1KB
-
MD5
9ff4d8fdc5288f2c110d40c80c4dcc25
-
SHA1
522c827b70102c114c3efbe0e8dacf71ca7ce2b5
-
SHA256
6bcfce0c879a9fb19af5860fc8cad59149dbfe003e6b330f04ee25fd37554ee4
-
SHA512
563faf37901162d8e79efcbe94db9123a2e1987e2f1cf22fa9e47722ca019736422c1c1d4fceb14a9f31102acbaf3cba6bf96a83e4f7d6a9ad0b6a077ecf9c00
Malware Config
Extracted
qakbot
403.973
obama214
1666019778
105.96.221.136:443
37.37.80.2:3389
105.154.56.232:995
41.107.116.19:443
105.103.52.189:443
159.192.204.135:443
41.107.58.251:443
177.152.65.142:443
102.47.218.41:443
176.45.35.243:443
70.173.248.13:443
102.159.77.134:995
220.123.29.76:443
82.12.196.197:443
103.156.237.71:443
149.126.159.254:443
176.44.119.153:443
181.56.171.3:995
190.205.229.67:2222
151.251.50.117:443
163.182.177.80:443
72.21.109.1:443
41.101.92.195:443
190.193.180.228:443
190.204.112.207:2222
41.97.56.102:443
41.69.209.76:443
190.78.89.157:993
206.1.216.19:2087
85.242.200.96:443
41.251.219.50:443
105.111.141.73:443
41.103.64.82:443
190.39.218.17:443
84.220.13.28:443
190.100.149.122:995
197.1.19.60:443
196.64.70.216:443
196.89.213.40:995
181.168.145.94:443
187.101.200.186:995
41.105.245.174:443
179.25.144.177:995
78.179.135.247:443
94.52.127.44:443
186.18.210.16:443
102.158.215.180:443
78.183.238.79:443
197.1.50.150:443
42.189.32.186:80
167.58.235.5:443
14.54.83.15:443
187.198.8.241:443
71.239.12.136:443
112.70.141.221:443
37.245.136.135:2222
88.232.10.69:443
41.98.250.65:443
82.205.9.34:443
196.64.239.75:443
37.8.68.1:443
197.1.248.244:443
197.2.139.7:443
79.45.134.162:22
182.183.211.163:995
154.246.14.94:443
144.86.17.168:443
182.185.29.69:995
160.177.47.116:6881
181.197.41.173:443
160.248.194.147:443
85.109.221.97:443
125.25.77.249:995
1.20.185.138:443
91.171.72.214:32100
197.10.195.7:443
45.160.33.163:443
202.170.206.61:995
96.9.66.118:995
132.251.244.227:443
113.188.13.246:443
78.181.39.116:443
1.53.101.75:443
197.202.173.111:443
31.201.40.194:443
197.116.178.224:443
79.155.159.177:443
181.188.164.123:443
156.221.50.226:995
41.251.15.7:990
45.240.140.233:995
102.188.91.158:995
189.243.187.76:443
179.105.182.216:995
196.65.230.248:995
181.141.3.126:443
128.234.26.174:995
78.161.194.147:443
78.101.177.210:443
86.217.167.235:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2040 mb.exe -
Loads dropped DLL 1 IoCs
pid Process 1104 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1128 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1260 regsvr32.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe 972 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1260 regsvr32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 576 wrote to memory of 1104 576 cmd.exe 27 PID 576 wrote to memory of 1104 576 cmd.exe 27 PID 576 wrote to memory of 1104 576 cmd.exe 27 PID 1104 wrote to memory of 2040 1104 cmd.exe 28 PID 1104 wrote to memory of 2040 1104 cmd.exe 28 PID 1104 wrote to memory of 2040 1104 cmd.exe 28 PID 2040 wrote to memory of 1260 2040 mb.exe 29 PID 2040 wrote to memory of 1260 2040 mb.exe 29 PID 2040 wrote to memory of 1260 2040 mb.exe 29 PID 2040 wrote to memory of 1260 2040 mb.exe 29 PID 2040 wrote to memory of 1260 2040 mb.exe 29 PID 2040 wrote to memory of 1260 2040 mb.exe 29 PID 2040 wrote to memory of 1260 2040 mb.exe 29 PID 1260 wrote to memory of 972 1260 regsvr32.exe 30 PID 1260 wrote to memory of 972 1260 regsvr32.exe 30 PID 1260 wrote to memory of 972 1260 regsvr32.exe 30 PID 1260 wrote to memory of 972 1260 regsvr32.exe 30 PID 1260 wrote to memory of 972 1260 regsvr32.exe 30 PID 1260 wrote to memory of 972 1260 regsvr32.exe 30 PID 1104 wrote to memory of 1128 1104 cmd.exe 31 PID 1104 wrote to memory of 1128 1104 cmd.exe 31 PID 1104 wrote to memory of 1128 1104 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Calculation.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vertices\asteroidal.cmd regsvr2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\mb.exeC:\Users\Admin\AppData\Local\Temp\mb.exe vertices\bombshell.asc3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\regsvr32.exevertices\bombshell.asc4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1128
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198