Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    166s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 01:39

General

  • Target

    6844c95e4ed873e55a8b8625f3ef37a61027b6122c218f64d4040373f1c8a193.exe

  • Size

    152KB

  • MD5

    8110e09f22a3e291b4877c1e1f54ffd2

  • SHA1

    2283ffc5fda725ff12a418755313571065115f41

  • SHA256

    6844c95e4ed873e55a8b8625f3ef37a61027b6122c218f64d4040373f1c8a193

  • SHA512

    3d3c5a43f2851558733f825acd073765845551b7ad9cf3019bf3c61c792dca10224da928c6834aa57ceac274a12e9cde2f184ca243e5cf8c54503880c4ee00b9

  • SSDEEP

    3072:UiSzMr/Yt8wZfLOweRty9bWT4Ni4oQZiEWV:IzMrQ+YBeW96TgeWS

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6844c95e4ed873e55a8b8625f3ef37a61027b6122c218f64d4040373f1c8a193.exe
    "C:\Users\Admin\AppData\Local\Temp\6844c95e4ed873e55a8b8625f3ef37a61027b6122c218f64d4040373f1c8a193.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Users\Admin\miozi.exe
      "C:\Users\Admin\miozi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\miozi.exe

    Filesize

    152KB

    MD5

    6faf14672fb36e197586ba871594a756

    SHA1

    4c00ad789dcca93882665de42b3fd3b7b06cf0fd

    SHA256

    6ee6ade4fa6806346ea46137673cee3604691312743aef9b99e5405c570375ee

    SHA512

    ef81024df6fe9c94b7bc0b2ee2e4fe2a34edd00ab460f94d4da2f62e2806c7701de4b48729d14f35ea219dbfd10ed2118b55edfd8bdde4677bd56f0ec5253e05

  • C:\Users\Admin\miozi.exe

    Filesize

    152KB

    MD5

    6faf14672fb36e197586ba871594a756

    SHA1

    4c00ad789dcca93882665de42b3fd3b7b06cf0fd

    SHA256

    6ee6ade4fa6806346ea46137673cee3604691312743aef9b99e5405c570375ee

    SHA512

    ef81024df6fe9c94b7bc0b2ee2e4fe2a34edd00ab460f94d4da2f62e2806c7701de4b48729d14f35ea219dbfd10ed2118b55edfd8bdde4677bd56f0ec5253e05

  • \Users\Admin\miozi.exe

    Filesize

    152KB

    MD5

    6faf14672fb36e197586ba871594a756

    SHA1

    4c00ad789dcca93882665de42b3fd3b7b06cf0fd

    SHA256

    6ee6ade4fa6806346ea46137673cee3604691312743aef9b99e5405c570375ee

    SHA512

    ef81024df6fe9c94b7bc0b2ee2e4fe2a34edd00ab460f94d4da2f62e2806c7701de4b48729d14f35ea219dbfd10ed2118b55edfd8bdde4677bd56f0ec5253e05

  • \Users\Admin\miozi.exe

    Filesize

    152KB

    MD5

    6faf14672fb36e197586ba871594a756

    SHA1

    4c00ad789dcca93882665de42b3fd3b7b06cf0fd

    SHA256

    6ee6ade4fa6806346ea46137673cee3604691312743aef9b99e5405c570375ee

    SHA512

    ef81024df6fe9c94b7bc0b2ee2e4fe2a34edd00ab460f94d4da2f62e2806c7701de4b48729d14f35ea219dbfd10ed2118b55edfd8bdde4677bd56f0ec5253e05

  • memory/1896-56-0x0000000076871000-0x0000000076873000-memory.dmp

    Filesize

    8KB