Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
Originals.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Originals.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
carcasses/muddler.cmd
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
carcasses/muddler.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
carcasses/relocated.dll
Resource
win7-20220901-en
General
-
Target
Originals.lnk
-
Size
1KB
-
MD5
90af1b34486a977c3d31d28bdc24026a
-
SHA1
c660ed19958c995519904e0643f10d5563e84042
-
SHA256
876b9f2a470619a165b5909bcbf50d8395ea527352f16d027df056207e70ebf2
-
SHA512
d97e5837df81ebd6b1ffaf2f2ac04f65073af0edee992192db43e5512dc25e8f4027d4e43f3fc4ee5eb3e5e37ff632bd1e4c363463a0c788222424738afddc4c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 bbc.exe -
Loads dropped DLL 1 IoCs
pid Process 1748 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1748 1476 cmd.exe 28 PID 1476 wrote to memory of 1748 1476 cmd.exe 28 PID 1476 wrote to memory of 1748 1476 cmd.exe 28 PID 1748 wrote to memory of 1776 1748 cmd.exe 29 PID 1748 wrote to memory of 1776 1748 cmd.exe 29 PID 1748 wrote to memory of 1776 1748 cmd.exe 29 PID 1776 wrote to memory of 1660 1776 bbc.exe 30 PID 1776 wrote to memory of 1660 1776 bbc.exe 30 PID 1776 wrote to memory of 1660 1776 bbc.exe 30 PID 1776 wrote to memory of 1660 1776 bbc.exe 30 PID 1776 wrote to memory of 1660 1776 bbc.exe 30 PID 1776 wrote to memory of 1660 1776 bbc.exe 30 PID 1776 wrote to memory of 1660 1776 bbc.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Originals.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c carcasses\muddler.cmd re gs vr2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\bbc.exeC:\Users\Admin\AppData\Local\Temp\bbc.exe carcasses\relocated.des3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\regsvr32.execarcasses\relocated.des4⤵PID:1660
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198