Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 04:08

General

  • Target

    ea3bb0089bb6ea9eacdcb91daa7dd59a9e8dc07c721c0767c41e90d0a9395457.exe

  • Size

    491KB

  • MD5

    7b1952ac002bff3c09d1ab4d74cc17fc

  • SHA1

    d2e5c352fac31b72cd3f26ce5c9aca0190492b9f

  • SHA256

    ea3bb0089bb6ea9eacdcb91daa7dd59a9e8dc07c721c0767c41e90d0a9395457

  • SHA512

    60fcba3fcd61a76c8830c8495fccc68ee5c5d5c881f1b4cb93f097f72e28da38547065af3b925dc9a626258a573f9f8c2d881aa7adce450b5d8851132ab802fb

  • SSDEEP

    12288:TK2mhAMJ/cPlXEuZILxfs1Exj0oHpEN0Ea9Cp5bkO4bBg+:W2O/GllCxfsi0cAHbkOsO+

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea3bb0089bb6ea9eacdcb91daa7dd59a9e8dc07c721c0767c41e90d0a9395457.exe
    "C:\Users\Admin\AppData\Local\Temp\ea3bb0089bb6ea9eacdcb91daa7dd59a9e8dc07c721c0767c41e90d0a9395457.exe"
    1⤵
    • Drops file in System32 directory
    PID:108
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Drops file in System32 directory
    • Suspicious use of FindShellTrayWindow
    PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\love\image.jpg

    Filesize

    104KB

    MD5

    b507d87993565c1334b6a317230726bb

    SHA1

    cd87a8a667f7699d4b13be47d42aaa2b0dd6e905

    SHA256

    2b42b422e1fd16b08de146d531ff80521c36e4cfd85ac8c6c20031ff88bc28f7

    SHA512

    c347c1906e9faaaf90a824f0c8e3de0bb399f864f32c4389450f75b3d6e1c719ce475018f4787b14cea5efbe543203b9a336a983a8d002613ee1e2622fc5459a

  • memory/108-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB