Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 21:57

General

  • Target

    194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe

  • Size

    84KB

  • MD5

    0c5128c21d0c67bd6d48f71877960300

  • SHA1

    60845650b033ea94df071102c8891b98c38668e8

  • SHA256

    194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18

  • SHA512

    5c7eb06c538b0538fe0633c441bd79882131d702ec57902120e62138ee0e66c51f20ae853a6f0b355282e05beec88277b900f974ab2fda20c38597257a7df58a

  • SSDEEP

    768:d6fmuec4OdJNUC1x2avPPpykILkGuIBLP3nqZCcLX/CVSFJ0T72Uap5/7TONS9:d/ZOdUCJwVuTocTzFJ0T72VpN9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe
    "C:\Users\Admin\AppData\Local\Temp\194b5a1b9b59b72bdc812341178c8fd2cfda256e199b19936d0122e3f8598f18.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\daveb.exe
      "C:\Users\Admin\daveb.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\daveb.exe

    Filesize

    84KB

    MD5

    258b6f34a110cfd51d379c89234a238e

    SHA1

    08e1fc110c86f6b6af563dea171977310b24061c

    SHA256

    4e73c362e8b7f1c9599839d9791065bd5d4b8537ad9e0e4bf4b5d2f9d51e5224

    SHA512

    c406a7e21643240e80ea25c26682b9d99f8f5c7256d65f94880f5a884baee602e0c31bb6e7b1f7eb4189d679e637e28f69874fadfe941fe57ae2d623511a639c

  • C:\Users\Admin\daveb.exe

    Filesize

    84KB

    MD5

    258b6f34a110cfd51d379c89234a238e

    SHA1

    08e1fc110c86f6b6af563dea171977310b24061c

    SHA256

    4e73c362e8b7f1c9599839d9791065bd5d4b8537ad9e0e4bf4b5d2f9d51e5224

    SHA512

    c406a7e21643240e80ea25c26682b9d99f8f5c7256d65f94880f5a884baee602e0c31bb6e7b1f7eb4189d679e637e28f69874fadfe941fe57ae2d623511a639c

  • \Users\Admin\daveb.exe

    Filesize

    84KB

    MD5

    258b6f34a110cfd51d379c89234a238e

    SHA1

    08e1fc110c86f6b6af563dea171977310b24061c

    SHA256

    4e73c362e8b7f1c9599839d9791065bd5d4b8537ad9e0e4bf4b5d2f9d51e5224

    SHA512

    c406a7e21643240e80ea25c26682b9d99f8f5c7256d65f94880f5a884baee602e0c31bb6e7b1f7eb4189d679e637e28f69874fadfe941fe57ae2d623511a639c

  • \Users\Admin\daveb.exe

    Filesize

    84KB

    MD5

    258b6f34a110cfd51d379c89234a238e

    SHA1

    08e1fc110c86f6b6af563dea171977310b24061c

    SHA256

    4e73c362e8b7f1c9599839d9791065bd5d4b8537ad9e0e4bf4b5d2f9d51e5224

    SHA512

    c406a7e21643240e80ea25c26682b9d99f8f5c7256d65f94880f5a884baee602e0c31bb6e7b1f7eb4189d679e637e28f69874fadfe941fe57ae2d623511a639c

  • memory/1504-56-0x00000000768A1000-0x00000000768A3000-memory.dmp

    Filesize

    8KB