Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 15:02
Behavioral task
behavioral1
Sample
b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe
Resource
win7-20220812-en
General
-
Target
b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe
-
Size
298KB
-
MD5
91b8fd8a66fb9126763a232499c98d30
-
SHA1
308e39a28c986f4247d78d162c14d021d2cb955d
-
SHA256
b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48
-
SHA512
7fece1448e8b87a7f14cdf6ab2ea0ae7aa250f84ed24cad0a2094184d37e3cda0943c3773bcae8ae16397af51004abb4c1c25cebeca6359500a8e61ea2a9166c
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYa:v6Wq4aaE6KwyF5L0Y2D1PqLH
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1324 svhost.exe 1744 svhost.exe -
resource yara_rule behavioral1/files/0x0007000000005c50-56.dat upx behavioral1/files/0x0007000000005c50-58.dat upx behavioral1/files/0x0007000000005c50-60.dat upx behavioral1/memory/1388-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1324-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1744-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1388-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1324-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1744-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\k: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1388-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1324-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1744-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1388-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1324-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1744-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1324 svhost.exe 1744 svhost.exe 1744 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1744 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1744 svhost.exe 1324 svhost.exe 1744 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1744 svhost.exe 1324 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1744 svhost.exe 1324 svhost.exe 1744 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1744 svhost.exe 1324 svhost.exe 1744 svhost.exe 1744 svhost.exe 1324 svhost.exe 1324 svhost.exe 1744 svhost.exe 1324 svhost.exe 1324 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1324 svhost.exe 1744 svhost.exe 1744 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1744 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1744 svhost.exe 1324 svhost.exe 1744 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1744 svhost.exe 1324 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1744 svhost.exe 1324 svhost.exe 1744 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1324 svhost.exe 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 1744 svhost.exe 1324 svhost.exe 1744 svhost.exe 1744 svhost.exe 1324 svhost.exe 1324 svhost.exe 1744 svhost.exe 1324 svhost.exe 1324 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe 1744 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1324 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 26 PID 1388 wrote to memory of 1324 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 26 PID 1388 wrote to memory of 1324 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 26 PID 1388 wrote to memory of 1324 1388 b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe 26 PID 1324 wrote to memory of 1744 1324 svhost.exe 27 PID 1324 wrote to memory of 1744 1324 svhost.exe 27 PID 1324 wrote to memory of 1744 1324 svhost.exe 27 PID 1324 wrote to memory of 1744 1324 svhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe"C:\Users\Admin\AppData\Local\Temp\b847936013481d6f6429c8f26f24b99feb17f335f5ac9eeb25a09318cb96ff48.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1744
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD56b3002494bbf65dca0d982187d3bd718
SHA1411b71996f9cf6f11eb2f2e29ca9750057c0e33e
SHA256189ece490ed48dc358bec0526df4785a8e58bc8e553ec50f6901b3e8a6665729
SHA51253c90a6ae7f8ca92c461a94d39413b01d34b1fb1493f5e512b15f7bd4c99be0bc650d82f30d9708294b19f2391911fafe8cda1eac1d70db203ff00316979f2ae
-
Filesize
298KB
MD56b3002494bbf65dca0d982187d3bd718
SHA1411b71996f9cf6f11eb2f2e29ca9750057c0e33e
SHA256189ece490ed48dc358bec0526df4785a8e58bc8e553ec50f6901b3e8a6665729
SHA51253c90a6ae7f8ca92c461a94d39413b01d34b1fb1493f5e512b15f7bd4c99be0bc650d82f30d9708294b19f2391911fafe8cda1eac1d70db203ff00316979f2ae
-
Filesize
298KB
MD56b3002494bbf65dca0d982187d3bd718
SHA1411b71996f9cf6f11eb2f2e29ca9750057c0e33e
SHA256189ece490ed48dc358bec0526df4785a8e58bc8e553ec50f6901b3e8a6665729
SHA51253c90a6ae7f8ca92c461a94d39413b01d34b1fb1493f5e512b15f7bd4c99be0bc650d82f30d9708294b19f2391911fafe8cda1eac1d70db203ff00316979f2ae