Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe
Resource
win10v2004-20220812-en
General
-
Target
84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe
-
Size
750KB
-
MD5
91396b48fe4097dc4cac1236734d9030
-
SHA1
f60b7690a14c7680b80508bc832bb7fb9e032183
-
SHA256
84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6
-
SHA512
4680c53a7b896a9f7cfd316bffbc801e35cc6ffbde0c86278a136a73fab891765b7303da1104e9756cabc0ab1711a9087d681abadc5b9d780dc6a4968457baf0
-
SSDEEP
12288:RDGJuO8TJMn/h0a8ntcw/zfZkjN3lUmF2bCPVjQiuOwJN48RWwyuEyuUDodXGEXS:RSJu7AhV8tcw7Z+NRF2uP65FJtwwZ5oY
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1696 nokav.exe 856 zixuqy.exe 680 vouzg.exe -
Deletes itself 1 IoCs
pid Process 1384 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 1696 nokav.exe 1696 nokav.exe 856 zixuqy.exe 856 zixuqy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 680 vouzg.exe 680 vouzg.exe 680 vouzg.exe 680 vouzg.exe 680 vouzg.exe 680 vouzg.exe 680 vouzg.exe 680 vouzg.exe 680 vouzg.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1696 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 27 PID 1132 wrote to memory of 1696 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 27 PID 1132 wrote to memory of 1696 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 27 PID 1132 wrote to memory of 1696 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 27 PID 1132 wrote to memory of 1384 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 28 PID 1132 wrote to memory of 1384 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 28 PID 1132 wrote to memory of 1384 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 28 PID 1132 wrote to memory of 1384 1132 84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe 28 PID 1696 wrote to memory of 856 1696 nokav.exe 30 PID 1696 wrote to memory of 856 1696 nokav.exe 30 PID 1696 wrote to memory of 856 1696 nokav.exe 30 PID 1696 wrote to memory of 856 1696 nokav.exe 30 PID 856 wrote to memory of 680 856 zixuqy.exe 31 PID 856 wrote to memory of 680 856 zixuqy.exe 31 PID 856 wrote to memory of 680 856 zixuqy.exe 31 PID 856 wrote to memory of 680 856 zixuqy.exe 31 PID 856 wrote to memory of 1500 856 zixuqy.exe 32 PID 856 wrote to memory of 1500 856 zixuqy.exe 32 PID 856 wrote to memory of 1500 856 zixuqy.exe 32 PID 856 wrote to memory of 1500 856 zixuqy.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe"C:\Users\Admin\AppData\Local\Temp\84c5a11552eda0feab083594d6a1ee1f275769c20978d4347ade1f168ff52ed6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\nokav.exe"C:\Users\Admin\AppData\Local\Temp\nokav.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\zixuqy.exe"C:\Users\Admin\AppData\Local\Temp\zixuqy.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\vouzg.exe"C:\Users\Admin\AppData\Local\Temp\vouzg.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:680
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1500
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:1384
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5665d40f83d93cbe3d8c9e78cda8c0d48
SHA1b4a888f0b7da943559680895f76d40851034f733
SHA2567bc428a5a5f09ad377d471507948e7aeb19f07972509771303efdec672b478e3
SHA512a39052e985d9d223be14c7867698d936f69d6a1f6a14862b5b93293f3ddc7d55e63b25f96a186ed05d83ff248587c411794d5bb8e9d9670fc2eaa8fd1930637d
-
Filesize
224B
MD5a56f4dda8452465cfadc0538e4ef007b
SHA118634479aa0cc15b40c64c644e0456a8a150fc2b
SHA256e851917fa2b90afcb37b7935a934522f478e334983ce89c903f398ae675c4380
SHA512d3f38121e10d9ad98ca16133082a3147fe77caf0ae205674811c616fa887bdbf2033026fee7df629afba294f1a21fa6582b6f208be56459b4d97a5b93b269d76
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD58c10bcb39d0376d310cbe050aee6fb3a
SHA1b67e6948d147e51447fc9269b88a74f6bf207443
SHA25614bcad6a6e3f96f75564b954db5662b5ab1baa863516b6e469777d90975cd2c7
SHA51215905b94a4180eb16756680d97e15cdf052c8c5bc0c610a78533e5678547fd778df3b114e2b91f582c05dfcff578ddf46a9a1542e272114293dc341e44064f3d
-
Filesize
751KB
MD569c3813de49d406f4ba35c3d29b39921
SHA1b22b9121b7b580e5828b928297436f1b869be38b
SHA25655509b34219dfee7729663a2a473493134d1eb7f701aeb936d2b7f9800229248
SHA512c66d6f498c7aa2f812994666e66dc2138a5abf13d64aee3c06216bb8ed45498c02d03f64f46150976856b2d46876f95811f131b90eca087ebb77cf24b4cfad20
-
Filesize
751KB
MD569c3813de49d406f4ba35c3d29b39921
SHA1b22b9121b7b580e5828b928297436f1b869be38b
SHA25655509b34219dfee7729663a2a473493134d1eb7f701aeb936d2b7f9800229248
SHA512c66d6f498c7aa2f812994666e66dc2138a5abf13d64aee3c06216bb8ed45498c02d03f64f46150976856b2d46876f95811f131b90eca087ebb77cf24b4cfad20
-
Filesize
652KB
MD5a96ddc9c784da16b6ed2fc4994abe061
SHA1fc58a7afb6d307e6484120aafe946e9333efde47
SHA2569e07c35a1671baa17a3e5d2f29de1117293f0b8ebb3461793d17df0da0b3b311
SHA512c6d365c651a73330f125e451c3ffe909e3a6e379952d66d5658be178fb47f7a2d75237ef6022d1e6efa4fd879f578519dc7a79cbd155dd532e3b811057253061
-
Filesize
751KB
MD569c3813de49d406f4ba35c3d29b39921
SHA1b22b9121b7b580e5828b928297436f1b869be38b
SHA25655509b34219dfee7729663a2a473493134d1eb7f701aeb936d2b7f9800229248
SHA512c66d6f498c7aa2f812994666e66dc2138a5abf13d64aee3c06216bb8ed45498c02d03f64f46150976856b2d46876f95811f131b90eca087ebb77cf24b4cfad20
-
Filesize
751KB
MD569c3813de49d406f4ba35c3d29b39921
SHA1b22b9121b7b580e5828b928297436f1b869be38b
SHA25655509b34219dfee7729663a2a473493134d1eb7f701aeb936d2b7f9800229248
SHA512c66d6f498c7aa2f812994666e66dc2138a5abf13d64aee3c06216bb8ed45498c02d03f64f46150976856b2d46876f95811f131b90eca087ebb77cf24b4cfad20
-
Filesize
751KB
MD569c3813de49d406f4ba35c3d29b39921
SHA1b22b9121b7b580e5828b928297436f1b869be38b
SHA25655509b34219dfee7729663a2a473493134d1eb7f701aeb936d2b7f9800229248
SHA512c66d6f498c7aa2f812994666e66dc2138a5abf13d64aee3c06216bb8ed45498c02d03f64f46150976856b2d46876f95811f131b90eca087ebb77cf24b4cfad20
-
Filesize
751KB
MD569c3813de49d406f4ba35c3d29b39921
SHA1b22b9121b7b580e5828b928297436f1b869be38b
SHA25655509b34219dfee7729663a2a473493134d1eb7f701aeb936d2b7f9800229248
SHA512c66d6f498c7aa2f812994666e66dc2138a5abf13d64aee3c06216bb8ed45498c02d03f64f46150976856b2d46876f95811f131b90eca087ebb77cf24b4cfad20
-
Filesize
652KB
MD5a96ddc9c784da16b6ed2fc4994abe061
SHA1fc58a7afb6d307e6484120aafe946e9333efde47
SHA2569e07c35a1671baa17a3e5d2f29de1117293f0b8ebb3461793d17df0da0b3b311
SHA512c6d365c651a73330f125e451c3ffe909e3a6e379952d66d5658be178fb47f7a2d75237ef6022d1e6efa4fd879f578519dc7a79cbd155dd532e3b811057253061
-
Filesize
652KB
MD5a96ddc9c784da16b6ed2fc4994abe061
SHA1fc58a7afb6d307e6484120aafe946e9333efde47
SHA2569e07c35a1671baa17a3e5d2f29de1117293f0b8ebb3461793d17df0da0b3b311
SHA512c6d365c651a73330f125e451c3ffe909e3a6e379952d66d5658be178fb47f7a2d75237ef6022d1e6efa4fd879f578519dc7a79cbd155dd532e3b811057253061
-
Filesize
751KB
MD569c3813de49d406f4ba35c3d29b39921
SHA1b22b9121b7b580e5828b928297436f1b869be38b
SHA25655509b34219dfee7729663a2a473493134d1eb7f701aeb936d2b7f9800229248
SHA512c66d6f498c7aa2f812994666e66dc2138a5abf13d64aee3c06216bb8ed45498c02d03f64f46150976856b2d46876f95811f131b90eca087ebb77cf24b4cfad20
-
Filesize
751KB
MD569c3813de49d406f4ba35c3d29b39921
SHA1b22b9121b7b580e5828b928297436f1b869be38b
SHA25655509b34219dfee7729663a2a473493134d1eb7f701aeb936d2b7f9800229248
SHA512c66d6f498c7aa2f812994666e66dc2138a5abf13d64aee3c06216bb8ed45498c02d03f64f46150976856b2d46876f95811f131b90eca087ebb77cf24b4cfad20