Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 19:18

General

  • Target

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe

  • Size

    312KB

  • MD5

    4588d6515198e39f1b4f42d3873650a0

  • SHA1

    bc9be43667c91ab79cbd6ed75b572602f95c90c1

  • SHA256

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5

  • SHA512

    b7580f60785ce34981657d1a2ffe1a36a34b34b88c225c5fee35ae5841024b6c2194945553c0365819ee8b704251ea7ec375f2944549133e1de61f6f3b707cb3

  • SSDEEP

    6144:wRDQklQdJvUq2S9x9bXlw0x4RtLcjXHt7FBaNrWMarMWkwHEo:wRDQklQdJvUhShXS00LcjHthKK1rRao

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe
    "C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe
      "C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Looks for VirtualBox Guest Additions in registry
      • Adds policy Run key to start application
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies Control Panel
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:904
      • C:\Users\Admin\AppData\Local\Temp\tmpDDF1.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpDDF1.exe" "C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Users\Admin\AppData\Local\Temp\tmpDDF1.exe
          "C:\Users\Admin\AppData\Local\Temp\tmpDDF1.exe" "C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          PID:1776
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ping 127.0.0.1 >> nul
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1168
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          PID:300
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:1112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.bin\S-1-5-21-3845472200-3839195424-595303356-1000\$ast-S-1-5-21-3845472200-3839195424-595303356-1000\2vPfuDSafA5nWelqM.dat

    Filesize

    21KB

    MD5

    bed80f327037f1301098724544f2a833

    SHA1

    95288d5b9d4bf21ced9b1d7b366d19dab7b51bdb

    SHA256

    0ce7712bab10a4448e2b556c24aca4146738f710895b93939725755f3bf64c6e

    SHA512

    54c7b5741b5cc02114d60cd4a002de2ea6c2eecea44e1deed851ad7e3344fa70f2bcafcd1f1411d7dad857fda6730632c36f259327c948933699edd2c57c055f

  • C:\$Recycle.bin\S-1-5-21-3845472200-3839195424-595303356-1000\$ast-S-1-5-21-3845472200-3839195424-595303356-1000\Kg5qSuPTsEoYrNBANaUWO.dat

    Filesize

    131KB

    MD5

    9e96c6a5621a1aacd3a1b03ee9346aff

    SHA1

    b856dbbf173425501983f719646937564ec83f19

    SHA256

    bd66e7a0da6d97fa34efeb863c3b2727617b6611038a3063fd086c8e58323657

    SHA512

    2e1eb367d09c481adc387aea9b7b8dfe4c2ec3d6e91dca33c4b08c6d3158c371d07927afb8a14ef30a890bde5c622e1dd72373dff24c42c432f74914796e174d

  • C:\$Recycle.bin\S-1-5-21-3845472200-3839195424-595303356-1000\$ast-S-1-5-21-3845472200-3839195424-595303356-1000\bNHLXDNU3n_SK9ip6WKEkJcim.dat

    Filesize

    423B

    MD5

    cc1501cdd30f66c67d20f339407886b3

    SHA1

    df21c1dadc20c45d55d331a093911ba4b3dbd3fe

    SHA256

    9c0c788de58ed865f5dc4db4c5dbeb110e7a5c83b206a94ffb519e9febec4dfc

    SHA512

    8b7874480caa9da8fa6c6b9cfc258052975a186fede19429c0716a5e8d399deabb2d75780a4944d23fcbca69a474aec783711fe46933d28296dc7fc957b5dc59

  • C:\$Recycle.bin\S-1-5-21-3845472200-3839195424-595303356-1000\$ast-S-1-5-21-3845472200-3839195424-595303356-1000\nrSsd7s1V93OBspTnxcCtkfxY4s.dat

    Filesize

    463B

    MD5

    ccd7c21e74728b34432269a0ff0625ee

    SHA1

    c03d0d5a744cf8d813160cbf5e9d3aa58b4671fa

    SHA256

    60fbdfd58a7bcb1cc7cfbf9086d1f63fb82632b44b9d76e3519b2ce1518fcd86

    SHA512

    34b02a463f46568c95cd97e836b5db080477bca1cdcbdc6021932397bf4c1b63edc7a62a06cbffdfe59a4d006c2c774a4ad3b73fa08f961b5cbf57aed22a2adb

  • C:\$Recycle.bin\S-1-5-21-3845472200-3839195424-595303356-1000\$ast-S-1-5-21-3845472200-3839195424-595303356-1000\sy2T2MKFJ6MKksP1T.dat

    Filesize

    5KB

    MD5

    51a89846aa3f149dce035cca74bbc503

    SHA1

    74df0675827951d1c264d3c79b6491302ff30318

    SHA256

    c22536fe76545d3d0a01bcf6f83b6694280c030e2d00b6a1724b38ddeca6346b

    SHA512

    09c684fadd83aa75216b36eaa5d3f47f5c00c1af65be32a7d2371262a02d5e31307afb7f6ba0d3edf9fc405b8851b6fd1a077b5a993a1cc3ae2c2cf13d8e29d8

  • C:\Users\Admin\AppData\Local\Temp\tmpDDF1.exe

    Filesize

    312KB

    MD5

    4588d6515198e39f1b4f42d3873650a0

    SHA1

    bc9be43667c91ab79cbd6ed75b572602f95c90c1

    SHA256

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5

    SHA512

    b7580f60785ce34981657d1a2ffe1a36a34b34b88c225c5fee35ae5841024b6c2194945553c0365819ee8b704251ea7ec375f2944549133e1de61f6f3b707cb3

  • C:\Users\Admin\AppData\Local\Temp\tmpDDF1.exe

    Filesize

    312KB

    MD5

    4588d6515198e39f1b4f42d3873650a0

    SHA1

    bc9be43667c91ab79cbd6ed75b572602f95c90c1

    SHA256

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5

    SHA512

    b7580f60785ce34981657d1a2ffe1a36a34b34b88c225c5fee35ae5841024b6c2194945553c0365819ee8b704251ea7ec375f2944549133e1de61f6f3b707cb3

  • C:\Users\Admin\AppData\Local\Temp\tmpDDF1.exe

    Filesize

    312KB

    MD5

    4588d6515198e39f1b4f42d3873650a0

    SHA1

    bc9be43667c91ab79cbd6ed75b572602f95c90c1

    SHA256

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5

    SHA512

    b7580f60785ce34981657d1a2ffe1a36a34b34b88c225c5fee35ae5841024b6c2194945553c0365819ee8b704251ea7ec375f2944549133e1de61f6f3b707cb3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\autochk.lnk

    Filesize

    1KB

    MD5

    7e81f8d31f09e6b8e06739a7df171683

    SHA1

    06fee3847b6a9ad3cb03936feeabca81ddd23478

    SHA256

    9fbe8bff8a2d222e983f57384fe0a2f6441c18785ea1a55168be82ac2e17d3ea

    SHA512

    d167f8ec9c36b501c4403d55634ba316d86c1a132f749da9c8ec31ad8a51d4748c8064e8ea14cae8d759bf79485ec17bb2ee4ecbd50788ab45ae3f2e98ac5ad5

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\autochk.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • memory/904-85-0x0000000002140000-0x000000000214B000-memory.dmp

    Filesize

    44KB

  • memory/904-77-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmp

    Filesize

    8KB

  • memory/904-83-0x000000000093A000-0x000000000093F000-memory.dmp

    Filesize

    20KB

  • memory/1216-109-0x00000000029F0000-0x0000000002A15000-memory.dmp

    Filesize

    148KB

  • memory/1216-84-0x00000000029F0000-0x0000000002A15000-memory.dmp

    Filesize

    148KB

  • memory/1832-57-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1832-55-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1832-54-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1832-66-0x00000000751A1000-0x00000000751A3000-memory.dmp

    Filesize

    8KB

  • memory/1832-59-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1832-60-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1832-104-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1832-62-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1832-68-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1832-67-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1960-64-0x0000000000220000-0x0000000000256000-memory.dmp

    Filesize

    216KB