Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
65s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe
Resource
win10v2004-20220812-en
General
-
Target
ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe
-
Size
65KB
-
MD5
a08583ab538dd735ec9155552c073a40
-
SHA1
e101719c61425550118d555ab17ce3e3b9afcb7b
-
SHA256
ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4
-
SHA512
2f7824d8eb7aa14a8c47b5a85762b2d6c07542a70a1d369731b0762dfca973f95a7ccebacb62df4b40421d4766e978f5204e6004d2f96d5f177666491157c801
-
SSDEEP
768:A+J/HEdRbAY0iUNvVvdt5VeebD+Tq/QwIt0L06WRR373nMle29+I4U+Ooc4eC:A+eSnrTIs+Tq/Qw106S73nMlfPNU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 820 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1036 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1036 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1756 ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1756 wrote to memory of 820 1756 ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe 30 PID 1756 wrote to memory of 820 1756 ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe 30 PID 1756 wrote to memory of 820 1756 ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe 30 PID 1756 wrote to memory of 820 1756 ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe 30 PID 820 wrote to memory of 1036 820 cmd.exe 32 PID 820 wrote to memory of 1036 820 cmd.exe 32 PID 820 wrote to memory of 1036 820 cmd.exe 32 PID 820 wrote to memory of 1036 820 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe"C:\Users\Admin\AppData\Local\Temp\ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del ff035452ad84439358c6c13d89193dc22270b30f295b4d9a517102333cc3ddb4.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-