Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe
Resource
win10v2004-20220812-en
General
-
Target
0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe
-
Size
189KB
-
MD5
5937e078e34785f38bf1b4e4ed50365d
-
SHA1
d1d478ce1860925ae645683defc187f9282f12da
-
SHA256
0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f
-
SHA512
70325979ecd192737f53cc44d1950681cf3b65d153a2ebb66a2f7ac6e0a515723944985a006d8bbfd687beba268d051b11dd25dd90d7e5b8c5ead3c728727e73
-
SSDEEP
3072:qapOc/U/MbrUjD0ihQsXP0Y8jD9tgG6VRjW3xmR8yqzc2Hirzn2ODR/:tZMxEihnz8fXUkxmmy+c2CrT2ODl
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000c0000000054a8-54.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1520 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\M: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\P: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\X: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\Z: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\J: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\R: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\V: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\Y: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\H: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\K: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\Q: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\S: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\T: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\U: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\E: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\G: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\I: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\L: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\N: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\O: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe File opened (read-only) \??\W: 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1520 0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe"C:\Users\Admin\AppData\Local\Temp\0d84c148e7ce5ad90b491fa8f966289827cd8df822bee3ec40cf8b447402095f.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9