Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    188s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 16:28

General

  • Target

    eef336425ec990a798ea694dc2f5590195edc3f360046fa23cfd62663b3ebb4e.exe

  • Size

    392KB

  • MD5

    51d8233383c4f3da02361ef625c09a42

  • SHA1

    aa112dae8bb3233367fa7fa4c0c4fdf2236dc290

  • SHA256

    eef336425ec990a798ea694dc2f5590195edc3f360046fa23cfd62663b3ebb4e

  • SHA512

    b957eb31b2ca46ec87eb1f3f61772c8e6bab921f96a357c94666847da16e4c2e408db7fc19875d827bcdbe601538fd1173842eb10093a439a8565cc353df9e64

  • SSDEEP

    12288:Et8vVED3Bk0Mr9Vif7/F1hIIaYHuvAIS26:Et+gvMpVij/F1hV5HuvAIs

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eef336425ec990a798ea694dc2f5590195edc3f360046fa23cfd62663b3ebb4e.exe
    "C:\Users\Admin\AppData\Local\Temp\eef336425ec990a798ea694dc2f5590195edc3f360046fa23cfd62663b3ebb4e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe
      \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE
        \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1720
    • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE
      \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COMLOADER /d "\\.\C:\Program Files\FoxitReader\bin\COM7.EXE"
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1636
      • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe
        \\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    fe2517383c9007bfdfcf0212ef052754

    SHA1

    abeb5b538ec3a98266113429966813dc3779d507

    SHA256

    3a0abbf1fafade96f2b8b820b794f7ae4e164db8007e3916d4dab95413ad9c6b

    SHA512

    92519dd81be85478fbcc13834c75eae5ab026813e2b83a608eff5a787cfe1dda2ccda543333e9b41fafd0472fdcaef6701ff24527b3cf8d4292fda1e1a4b3945

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    fe2517383c9007bfdfcf0212ef052754

    SHA1

    abeb5b538ec3a98266113429966813dc3779d507

    SHA256

    3a0abbf1fafade96f2b8b820b794f7ae4e164db8007e3916d4dab95413ad9c6b

    SHA512

    92519dd81be85478fbcc13834c75eae5ab026813e2b83a608eff5a787cfe1dda2ccda543333e9b41fafd0472fdcaef6701ff24527b3cf8d4292fda1e1a4b3945

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    fe2517383c9007bfdfcf0212ef052754

    SHA1

    abeb5b538ec3a98266113429966813dc3779d507

    SHA256

    3a0abbf1fafade96f2b8b820b794f7ae4e164db8007e3916d4dab95413ad9c6b

    SHA512

    92519dd81be85478fbcc13834c75eae5ab026813e2b83a608eff5a787cfe1dda2ccda543333e9b41fafd0472fdcaef6701ff24527b3cf8d4292fda1e1a4b3945

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    37af269fa8f2f0136bb246ff3e0e805e

    SHA1

    22cc71b4de092bd19a12e9a677869984e1481070

    SHA256

    5f4cce123877b1434b33972f66ebfb59cbd9972b72d014b6550bf1cd80d18f09

    SHA512

    4456c3ba4bd5859d8731ad1e1d09523f203437a5962222b8496d08845adc04d2c46872bd5156ff44fe733cfcbc41915d15cd533aa5cc87cf3f43c8a7b20d1e1b

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    37af269fa8f2f0136bb246ff3e0e805e

    SHA1

    22cc71b4de092bd19a12e9a677869984e1481070

    SHA256

    5f4cce123877b1434b33972f66ebfb59cbd9972b72d014b6550bf1cd80d18f09

    SHA512

    4456c3ba4bd5859d8731ad1e1d09523f203437a5962222b8496d08845adc04d2c46872bd5156ff44fe733cfcbc41915d15cd533aa5cc87cf3f43c8a7b20d1e1b

  • C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    37af269fa8f2f0136bb246ff3e0e805e

    SHA1

    22cc71b4de092bd19a12e9a677869984e1481070

    SHA256

    5f4cce123877b1434b33972f66ebfb59cbd9972b72d014b6550bf1cd80d18f09

    SHA512

    4456c3ba4bd5859d8731ad1e1d09523f203437a5962222b8496d08845adc04d2c46872bd5156ff44fe733cfcbc41915d15cd533aa5cc87cf3f43c8a7b20d1e1b

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    fe2517383c9007bfdfcf0212ef052754

    SHA1

    abeb5b538ec3a98266113429966813dc3779d507

    SHA256

    3a0abbf1fafade96f2b8b820b794f7ae4e164db8007e3916d4dab95413ad9c6b

    SHA512

    92519dd81be85478fbcc13834c75eae5ab026813e2b83a608eff5a787cfe1dda2ccda543333e9b41fafd0472fdcaef6701ff24527b3cf8d4292fda1e1a4b3945

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    fe2517383c9007bfdfcf0212ef052754

    SHA1

    abeb5b538ec3a98266113429966813dc3779d507

    SHA256

    3a0abbf1fafade96f2b8b820b794f7ae4e164db8007e3916d4dab95413ad9c6b

    SHA512

    92519dd81be85478fbcc13834c75eae5ab026813e2b83a608eff5a787cfe1dda2ccda543333e9b41fafd0472fdcaef6701ff24527b3cf8d4292fda1e1a4b3945

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    fe2517383c9007bfdfcf0212ef052754

    SHA1

    abeb5b538ec3a98266113429966813dc3779d507

    SHA256

    3a0abbf1fafade96f2b8b820b794f7ae4e164db8007e3916d4dab95413ad9c6b

    SHA512

    92519dd81be85478fbcc13834c75eae5ab026813e2b83a608eff5a787cfe1dda2ccda543333e9b41fafd0472fdcaef6701ff24527b3cf8d4292fda1e1a4b3945

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE

    Filesize

    392KB

    MD5

    fe2517383c9007bfdfcf0212ef052754

    SHA1

    abeb5b538ec3a98266113429966813dc3779d507

    SHA256

    3a0abbf1fafade96f2b8b820b794f7ae4e164db8007e3916d4dab95413ad9c6b

    SHA512

    92519dd81be85478fbcc13834c75eae5ab026813e2b83a608eff5a787cfe1dda2ccda543333e9b41fafd0472fdcaef6701ff24527b3cf8d4292fda1e1a4b3945

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    37af269fa8f2f0136bb246ff3e0e805e

    SHA1

    22cc71b4de092bd19a12e9a677869984e1481070

    SHA256

    5f4cce123877b1434b33972f66ebfb59cbd9972b72d014b6550bf1cd80d18f09

    SHA512

    4456c3ba4bd5859d8731ad1e1d09523f203437a5962222b8496d08845adc04d2c46872bd5156ff44fe733cfcbc41915d15cd533aa5cc87cf3f43c8a7b20d1e1b

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    37af269fa8f2f0136bb246ff3e0e805e

    SHA1

    22cc71b4de092bd19a12e9a677869984e1481070

    SHA256

    5f4cce123877b1434b33972f66ebfb59cbd9972b72d014b6550bf1cd80d18f09

    SHA512

    4456c3ba4bd5859d8731ad1e1d09523f203437a5962222b8496d08845adc04d2c46872bd5156ff44fe733cfcbc41915d15cd533aa5cc87cf3f43c8a7b20d1e1b

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    37af269fa8f2f0136bb246ff3e0e805e

    SHA1

    22cc71b4de092bd19a12e9a677869984e1481070

    SHA256

    5f4cce123877b1434b33972f66ebfb59cbd9972b72d014b6550bf1cd80d18f09

    SHA512

    4456c3ba4bd5859d8731ad1e1d09523f203437a5962222b8496d08845adc04d2c46872bd5156ff44fe733cfcbc41915d15cd533aa5cc87cf3f43c8a7b20d1e1b

  • \Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe

    Filesize

    392KB

    MD5

    37af269fa8f2f0136bb246ff3e0e805e

    SHA1

    22cc71b4de092bd19a12e9a677869984e1481070

    SHA256

    5f4cce123877b1434b33972f66ebfb59cbd9972b72d014b6550bf1cd80d18f09

    SHA512

    4456c3ba4bd5859d8731ad1e1d09523f203437a5962222b8496d08845adc04d2c46872bd5156ff44fe733cfcbc41915d15cd533aa5cc87cf3f43c8a7b20d1e1b

  • memory/1708-54-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB