Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2022, 03:51

General

  • Target

    60e3f0709b44f5c2ea6e2d177741254fa2c745e4f961d81d8085d1652c4183ef.exe

  • Size

    156KB

  • MD5

    49ab5119b0e921b917caa94d90bb0080

  • SHA1

    e82144f322a5f9a4db733e458e9873ad13fdd28f

  • SHA256

    60e3f0709b44f5c2ea6e2d177741254fa2c745e4f961d81d8085d1652c4183ef

  • SHA512

    018abd961bd7a7de6e7581607dc101f8556f9149f889810be88d853d82cf0bbc2b07947b824cb8d7e373036f29a0b2e2b0c3092e67e216db279f87757f7aa7c9

  • SSDEEP

    3072:a5/2cqj0C0H3RvXs45qlCG8v12aO1AwPgamPe42IZ54oQZiEDz:QHW0Lvulf8v12aO1AwSPe4RxWZ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60e3f0709b44f5c2ea6e2d177741254fa2c745e4f961d81d8085d1652c4183ef.exe
    "C:\Users\Admin\AppData\Local\Temp\60e3f0709b44f5c2ea6e2d177741254fa2c745e4f961d81d8085d1652c4183ef.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\laitaih.exe
      "C:\Users\Admin\laitaih.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\laitaih.exe

    Filesize

    156KB

    MD5

    1e08168da34838965b7094b4a27fadec

    SHA1

    b55d645a5b92c3ebb49730c136bc6ba7f75d6dbd

    SHA256

    2cc327f16a078f9d049ba046b618b739546d8d3119168950de1a50539996a4ce

    SHA512

    d6d7db994039f6c13265947dd2b2a32cb0e48cdde338375674c2ddd5c41c53b9d7aecfc58bce84c5365d63da8099efe910e9436f12f09219f5a7c464ccab7b4d

  • C:\Users\Admin\laitaih.exe

    Filesize

    156KB

    MD5

    1e08168da34838965b7094b4a27fadec

    SHA1

    b55d645a5b92c3ebb49730c136bc6ba7f75d6dbd

    SHA256

    2cc327f16a078f9d049ba046b618b739546d8d3119168950de1a50539996a4ce

    SHA512

    d6d7db994039f6c13265947dd2b2a32cb0e48cdde338375674c2ddd5c41c53b9d7aecfc58bce84c5365d63da8099efe910e9436f12f09219f5a7c464ccab7b4d

  • \Users\Admin\laitaih.exe

    Filesize

    156KB

    MD5

    1e08168da34838965b7094b4a27fadec

    SHA1

    b55d645a5b92c3ebb49730c136bc6ba7f75d6dbd

    SHA256

    2cc327f16a078f9d049ba046b618b739546d8d3119168950de1a50539996a4ce

    SHA512

    d6d7db994039f6c13265947dd2b2a32cb0e48cdde338375674c2ddd5c41c53b9d7aecfc58bce84c5365d63da8099efe910e9436f12f09219f5a7c464ccab7b4d

  • \Users\Admin\laitaih.exe

    Filesize

    156KB

    MD5

    1e08168da34838965b7094b4a27fadec

    SHA1

    b55d645a5b92c3ebb49730c136bc6ba7f75d6dbd

    SHA256

    2cc327f16a078f9d049ba046b618b739546d8d3119168950de1a50539996a4ce

    SHA512

    d6d7db994039f6c13265947dd2b2a32cb0e48cdde338375674c2ddd5c41c53b9d7aecfc58bce84c5365d63da8099efe910e9436f12f09219f5a7c464ccab7b4d

  • memory/1348-67-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1348-70-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1976-56-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1976-57-0x00000000754E1000-0x00000000754E3000-memory.dmp

    Filesize

    8KB

  • memory/1976-65-0x0000000002D00000-0x0000000002D27000-memory.dmp

    Filesize

    156KB

  • memory/1976-66-0x0000000002D00000-0x0000000002D27000-memory.dmp

    Filesize

    156KB

  • memory/1976-69-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB