Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe
Resource
win10v2004-20220812-en
General
-
Target
cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe
-
Size
70KB
-
MD5
4efdc031b019cc167cd0f11d0021d990
-
SHA1
ef1cba4f415cf65eb656d971154687bb2a8f64b2
-
SHA256
cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560
-
SHA512
1f97031756dab7d8b6b412cb28cf2b4a8b4c28d751904b750f4afb79fceb7e9fb5d805f21617bad96872c2edcf09b49c23cf568487dd2661ec2db7d0394f574d
-
SSDEEP
1536:zhX8slAtdbaYmcl85Bg2MyqlqfgeX7xIpIE7Zf4neAtFX1pNy:zd8qIbjm75jMyqkvxqCnntBU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyImgur = "C:\\Users\\Admin\\AppData\\Local\\Temp\\.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1112 wrote to memory of 856 1112 cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe 28 PID 1112 wrote to memory of 856 1112 cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe 28 PID 1112 wrote to memory of 856 1112 cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe 28 PID 1112 wrote to memory of 856 1112 cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe 28 PID 856 wrote to memory of 1228 856 cmd.exe 30 PID 856 wrote to memory of 1228 856 cmd.exe 30 PID 856 wrote to memory of 1228 856 cmd.exe 30 PID 856 wrote to memory of 1228 856 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe"C:\Users\Admin\AppData\Local\Temp\cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "MyImgur" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "MyImgur" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe3⤵
- Adds Run key to start application
PID:1228
-
-