Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 21:58

General

  • Target

    84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe

  • Size

    286KB

  • MD5

    93ae065f559a891f6e3ea4abeb58d036

  • SHA1

    073596e51d809e227aeb5984142e93c2526179c6

  • SHA256

    84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90

  • SHA512

    47c13d211da60bba0ad0a5d90d820e16516e6c21f2ba0705f1c040598597a7e7295557b92f9a9cbe0cc87ba4769fe6a8572086247f82a26768b064d2c283d5d5

  • SSDEEP

    6144:RDKW1Lgbdl0TBBvjc/TWawZq8CC95GpQWQByQWBoG2oJ:hh1Lk70TnvjcBwtCC7GprMGoGTJ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe
    "C:\Users\Admin\AppData\Local\Temp\84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://badeshan.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1520
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/emre.turgut.31521
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:952 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    0df4831226d6ceb34345636e36b85d1a

    SHA1

    3291656541c8e3aeaf97c1d8e57e26a21c56e429

    SHA256

    ab26e2d2e6c43d44cb240638d54ca0bdafb22b70d9ed73c78b17b074f5691417

    SHA512

    572a30503ff9e2e35e427c044d0b88f729bedf4c7581a82d81105fc0de4a2d4caa23a55e2a271bb8c8932018eaf51c1e356a4488a2e916c9b3c6541aa941bf3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd16ac1e8e5621d83e1236e8f10d0ed3

    SHA1

    cb751954fac6fa65bab073e017d168346c3969b0

    SHA256

    97a6c8b655d8f6bc4de399b9e9315798f71ff8427bde3d059456ba7964b1d68a

    SHA512

    01ad2f967724e16b31a403f69714370a2b7118fa84b8566b2dd65c0862020f4befd2fafca624aee7d21ff386ac783bd5ece7092fe8c41cc478d1284e0b3127a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    920c61ba123f65018a6802401d4f2659

    SHA1

    ae7e93ef68019bedf02948f4315968c91fe27eac

    SHA256

    dfe5dd01993b6c6bc6e77dfe96f4e9108776693de0bc5c724673a92088e79c55

    SHA512

    d62ca7d72f00a139a33f64fa34e4c61a165c397e1285c2bd934ff40874c0b2141e3a26cb5a9ded27773be147b7d0963b0e93cbe5ff499e04a62a7f369ae25274

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E2555E91-50F3-11ED-A964-EAF6071D98F9}.dat

    Filesize

    5KB

    MD5

    c636d276db74c5046aea1cfc218799f2

    SHA1

    d9f7d3697e8689824e3ea696f7308560c57057f1

    SHA256

    a23059df94b54ce5c88c1dd9efe5b7aba61fa354062334885dbea04b6f97b121

    SHA512

    044125f7861ea218ba1d54b364a398ecd1a31245e1db46e20c6e59b6115c40bb2973073167d7acfa21c69b28d553c221eb9f2261607b6ea424ae1db02ab2c3c2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E25C82B1-50F3-11ED-A964-EAF6071D98F9}.dat

    Filesize

    4KB

    MD5

    fa4a9e491ed6d6dbe0563e07c028fb1d

    SHA1

    25bfb1d2ac1612c7c1eb22e20979b3a6b4d0ce9e

    SHA256

    62fd933f5682ddf5d76daa25bbc20d0211da6aa164b7b624fc7528037d5767cd

    SHA512

    9786afeb1861920b3442105bf4fcfa9e91282bd8a931e68faeedeba7148aa64051fc29bcf83dfdb9a03186099078b376c06458251410a78901485d238d97afbb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    5KB

    MD5

    dd21c9b1f04dcd9d1831b3eb53cb27a8

    SHA1

    bcd1147300a981752d7149ff0fb5175ab2acebd8

    SHA256

    80671a6dc9d5e987c372d09457577798332cb2c476020071155961435e4039fc

    SHA512

    9e4f02a968fed1a2435046fe58dba164d1414eaaa3555a10235c28f29eab609a20c61044c50bee44c0b95bd662a041bb7ec0902d1357d3e8f059431ab399d1dc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KV9RASUV.txt

    Filesize

    606B

    MD5

    15c92ed7996282ab89bcd094f561bff7

    SHA1

    2a0c95443c9840cde35bed082eca9df306a0c932

    SHA256

    346cde61423599655aff86f5b1f187e7d927b0b3c0623b408386c8d721d5f6bd

    SHA512

    73c24be81de7cf294b9fd2defc1f2645cf26bd21fd8f7d8e6b1072b43e9e803cef15f941cc2f032cc26df4389634c9baae2300eb1bad1d88e04efd0f6b06aa6c

  • memory/1248-54-0x0000000001E90000-0x0000000001ECC000-memory.dmp

    Filesize

    240KB

  • memory/1248-61-0x000000000482A000-0x000000000483B000-memory.dmp

    Filesize

    68KB

  • memory/1248-58-0x000000000482A000-0x000000000483B000-memory.dmp

    Filesize

    68KB

  • memory/1248-57-0x0000000004C40000-0x0000000004C48000-memory.dmp

    Filesize

    32KB

  • memory/1248-56-0x0000000075351000-0x0000000075353000-memory.dmp

    Filesize

    8KB

  • memory/1248-55-0x0000000002170000-0x00000000021AC000-memory.dmp

    Filesize

    240KB