Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2022, 05:24

General

  • Target

    56259aeda9cbd5498eab6de3a5fb8de4f7f1982d7e52de5ea11d1e45e8178230.exe

  • Size

    212KB

  • MD5

    5425fed3d805a988da16ce27dc6f6024

  • SHA1

    b5468f6eac632d25a213275c03c77702896651bb

  • SHA256

    56259aeda9cbd5498eab6de3a5fb8de4f7f1982d7e52de5ea11d1e45e8178230

  • SHA512

    66f669b24844d4416f505abd28c615203bd9205fb5e7f2a44d0240d893ea3ed1b51d507be1180b4df1e1235658f2c88f8233cb2a8339c17807078e2b99f8a8c2

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmk:dHp/urb4A1WdBfr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56259aeda9cbd5498eab6de3a5fb8de4f7f1982d7e52de5ea11d1e45e8178230.exe
    "C:\Users\Admin\AppData\Local\Temp\56259aeda9cbd5498eab6de3a5fb8de4f7f1982d7e52de5ea11d1e45e8178230.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
    • \??\c:\Program Files0136EH.exe
      "c:\Program Files0136EH.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1028
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:904
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:552
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:1912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files0136EH.exe

    Filesize

    36KB

    MD5

    a4e391ac06379f513762eabc75e7c2ac

    SHA1

    9ead37ec76ceb55dd6fbfd031a976a1a54341a7c

    SHA256

    48cd036f0eb0415cece31cb1b5a10a7ac78800a78ce2f49a00b5d77cb667a827

    SHA512

    f2800a23a854862167e766ced3f91cc50d6b033e9f77cc523e61859a5472172961293b76647ae42d5554a51e9c996a64bc5536f7167dfb2b27ccd83887cf2c64

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{DBEBB8D1-5155-11ED-9172-7ADD0904B6AC}.dat

    Filesize

    5KB

    MD5

    353a5a80e601e72f92304ab81c01e2ce

    SHA1

    fc2f60803e1d83878f24ce086a8ad16fe211e237

    SHA256

    656ea2bd17a86f71b56682b303d00a4607b06b42ffbeabd9f3056944d2b378c3

    SHA512

    132ec5686b38492d77b1c033b3f6a560ba5a5543f2800d0c8962007aba5dd0bfff9acb0ff21a024cd7aac6000773cb1c1a7f59af6bb8d6890b36f64dbd6cfaa2

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    486B

    MD5

    340efa9ce90a8c057178d1295e999354

    SHA1

    7bcbeef550d74b554d84b166d72de5a66a4afd21

    SHA256

    55eb47aa67a4ef38cc7ed97fcb70a511892a2dcc8fb1e7580083f7af5a621e6d

    SHA512

    4a12a3e0f9b189dc61df965ac1b1a8a03e53ac05bff9368b21f05c73c612ee763a9b4312cc630bbeb951fd379eb8852507ea6d87eeb94cde87990fd0c3fca105

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AH6YSCRV.txt

    Filesize

    608B

    MD5

    7012e91368a9818e9ee2033f351d0a7c

    SHA1

    44e637d4eac9b8b405eb21c3b77bfb24269de575

    SHA256

    b5b9db79f1741dc5f4b2dfb465703e673d300da8fc9aeb1b554080f9478ab129

    SHA512

    e25bece6e161857597772bc0ff37f6a94a0afcaff446e4c50ea557c3d213c83dd0a536d3e45963ad72a429d37ad9b5ebcf339c00aa8712aa0e8c9908ee7d199a

  • memory/1664-56-0x0000000076181000-0x0000000076183000-memory.dmp

    Filesize

    8KB