Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
245s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe
Resource
win10v2004-20220812-en
General
-
Target
c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe
-
Size
135KB
-
MD5
965e6792655c4854a820cf27e7748710
-
SHA1
11434d0edc67382f2887e6e470b8ea2b9aa4de13
-
SHA256
c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e
-
SHA512
bd5d299311f93b7da822b0720147962ddc4277c65c0bd6e885de51b94a801f7474174a581b9d6f0af3208dd4be4d2b5d2c62f98607f7d39c9fcf6b8634ed330d
-
SSDEEP
3072:nL/Kd9XnJ4OXwHlt8qQg3Oi1OXvtWxepexZKj5tCYTK:WhJZYlgvtWepexZEK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1780 Taskngr.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ck2ZkFjuexVzhT.exe c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ck2ZkFjuexVzhT.exe c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ck2ZkFjuexVzhT.exe Taskngr.exe -
Loads dropped DLL 1 IoCs
pid Process 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ck2ZkFjuexVzhT = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe" c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ck2ZkFjuexVzhT = "C:\\Users\\Admin\\AppData\\Roaming\\Taskngr.exe" Taskngr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe 1780 Taskngr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1780 Taskngr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe Token: SeDebugPrivilege 1780 Taskngr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe 1780 Taskngr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe 1780 Taskngr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1780 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe 28 PID 1728 wrote to memory of 1780 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe 28 PID 1728 wrote to memory of 1780 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe 28 PID 1728 wrote to memory of 1780 1728 c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe"C:\Users\Admin\AppData\Local\Temp\c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Roaming\Taskngr.exe"C:\Users\Admin\AppData\Roaming\Taskngr.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5965e6792655c4854a820cf27e7748710
SHA111434d0edc67382f2887e6e470b8ea2b9aa4de13
SHA256c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e
SHA512bd5d299311f93b7da822b0720147962ddc4277c65c0bd6e885de51b94a801f7474174a581b9d6f0af3208dd4be4d2b5d2c62f98607f7d39c9fcf6b8634ed330d
-
Filesize
135KB
MD5965e6792655c4854a820cf27e7748710
SHA111434d0edc67382f2887e6e470b8ea2b9aa4de13
SHA256c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e
SHA512bd5d299311f93b7da822b0720147962ddc4277c65c0bd6e885de51b94a801f7474174a581b9d6f0af3208dd4be4d2b5d2c62f98607f7d39c9fcf6b8634ed330d
-
Filesize
135KB
MD5965e6792655c4854a820cf27e7748710
SHA111434d0edc67382f2887e6e470b8ea2b9aa4de13
SHA256c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e
SHA512bd5d299311f93b7da822b0720147962ddc4277c65c0bd6e885de51b94a801f7474174a581b9d6f0af3208dd4be4d2b5d2c62f98607f7d39c9fcf6b8634ed330d
-
Filesize
135KB
MD5965e6792655c4854a820cf27e7748710
SHA111434d0edc67382f2887e6e470b8ea2b9aa4de13
SHA256c981b63a4499bf9dbb00eb776f73535488893d131d06e4def2da070e10d8128e
SHA512bd5d299311f93b7da822b0720147962ddc4277c65c0bd6e885de51b94a801f7474174a581b9d6f0af3208dd4be4d2b5d2c62f98607f7d39c9fcf6b8634ed330d