Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2022, 02:40

General

  • Target

    cd2c90e134a064ae61b2abd899251440f9a373b3688b27639c49f25449b5f52a.exe

  • Size

    304KB

  • MD5

    63da5c277d57a134f48ded57cecec30a

  • SHA1

    b6ed7ab6bb2823e96488602235aae3817120019c

  • SHA256

    cd2c90e134a064ae61b2abd899251440f9a373b3688b27639c49f25449b5f52a

  • SHA512

    b9343a942be448ab896caaa4c6eb6509284d030e16245d3f54e1e88b81981bbd6dc9509a3f88ebee16e63ebf6c16b150c58948aa691d160e64ec9a7a18e17e26

  • SSDEEP

    3072:Gdf1i2Dwhe6YIRnbXtcU7DAzKqc+Fn1op2aEaDFHT+7pvPxvHU0:5xH7anxla8xv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd2c90e134a064ae61b2abd899251440f9a373b3688b27639c49f25449b5f52a.exe
    "C:\Users\Admin\AppData\Local\Temp\cd2c90e134a064ae61b2abd899251440f9a373b3688b27639c49f25449b5f52a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\fadoy.exe
      "C:\Users\Admin\fadoy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fadoy.exe

    Filesize

    304KB

    MD5

    b99462ad943fe1c8f943469193694e57

    SHA1

    a838ce36f9e091dc3a86f71ce33419ded84a5df4

    SHA256

    fc65b8e3cbe4201b52092a93f49d4506284ae511989f31fd3ce35b45422f945d

    SHA512

    68ebdf7fdddb347adae42d61dca98825e5eea757ab61bbe635f213ebb30a850841bc8071e9b77ab1597e42635ef6d04b1ca90799dd5e37c58cd81d73739ab0a4

  • C:\Users\Admin\fadoy.exe

    Filesize

    304KB

    MD5

    b99462ad943fe1c8f943469193694e57

    SHA1

    a838ce36f9e091dc3a86f71ce33419ded84a5df4

    SHA256

    fc65b8e3cbe4201b52092a93f49d4506284ae511989f31fd3ce35b45422f945d

    SHA512

    68ebdf7fdddb347adae42d61dca98825e5eea757ab61bbe635f213ebb30a850841bc8071e9b77ab1597e42635ef6d04b1ca90799dd5e37c58cd81d73739ab0a4

  • \Users\Admin\fadoy.exe

    Filesize

    304KB

    MD5

    b99462ad943fe1c8f943469193694e57

    SHA1

    a838ce36f9e091dc3a86f71ce33419ded84a5df4

    SHA256

    fc65b8e3cbe4201b52092a93f49d4506284ae511989f31fd3ce35b45422f945d

    SHA512

    68ebdf7fdddb347adae42d61dca98825e5eea757ab61bbe635f213ebb30a850841bc8071e9b77ab1597e42635ef6d04b1ca90799dd5e37c58cd81d73739ab0a4

  • \Users\Admin\fadoy.exe

    Filesize

    304KB

    MD5

    b99462ad943fe1c8f943469193694e57

    SHA1

    a838ce36f9e091dc3a86f71ce33419ded84a5df4

    SHA256

    fc65b8e3cbe4201b52092a93f49d4506284ae511989f31fd3ce35b45422f945d

    SHA512

    68ebdf7fdddb347adae42d61dca98825e5eea757ab61bbe635f213ebb30a850841bc8071e9b77ab1597e42635ef6d04b1ca90799dd5e37c58cd81d73739ab0a4

  • memory/2036-56-0x0000000076151000-0x0000000076153000-memory.dmp

    Filesize

    8KB