Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe
Resource
win10v2004-20220812-en
General
-
Target
1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe
-
Size
148KB
-
MD5
5d7b79d93d1490a8bb0766f5fe14b9e0
-
SHA1
6724e23a53061dae97ca19813de3a2b19e53127a
-
SHA256
1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571
-
SHA512
69ed380aa757802b6324b76a15c419f06e6a657bfba4d72172bd2c0894d7dc5d8e30c1b5d414d1da263ebd5ec2233e7edf3839dc18ec7d1206ace3ada6234b02
-
SSDEEP
3072:o3A5lgVnQ7GsRwNqmAlITlU4Q+SparIKxOXD2hR:o8GsOFA+o+SpEIKxOT
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1488 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1488 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1016 1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1336 1016 1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe 30 PID 1016 wrote to memory of 1336 1016 1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe 30 PID 1016 wrote to memory of 1336 1016 1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe 30 PID 1016 wrote to memory of 1336 1016 1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe 30 PID 1336 wrote to memory of 1488 1336 cmd.exe 32 PID 1336 wrote to memory of 1488 1336 cmd.exe 32 PID 1336 wrote to memory of 1488 1336 cmd.exe 32 PID 1336 wrote to memory of 1488 1336 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe"C:\Users\Admin\AppData\Local\Temp\1ed8a4f921341747b78449aee8152fc337d83e9d0aa0198e0b9f32a873a57571.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 1ed8a4f921341747b78449aee8152fc3372⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-