Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe
Resource
win10v2004-20220812-en
General
-
Target
8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe
-
Size
352KB
-
MD5
006543effb858695f39ddc4522460500
-
SHA1
f412cd02efef2d83e774b13b13c4771a83f13e8d
-
SHA256
8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689
-
SHA512
9c0ba9ff79e059addf698b2e91a5f12855adc09a836c9e92fc4f564f4b55d57fd484f629d599e98f43c1ce3025147b0ee6372d815acbd3fa2f724607243a8cd6
-
SSDEEP
6144:FrvdwMXe0Ho9yCIqP2q+3MhWDIhuZ1qD70HWWWCWWW+/85/8LDg:Fjbez9yCI62lbgU/85/8L
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000500000000b2d2-54.dat aspack_v212_v242 behavioral1/files/0x000500000000b2d2-55.dat aspack_v212_v242 behavioral1/files/0x000500000000b2d2-57.dat aspack_v212_v242 behavioral1/files/0x000500000000b2d2-59.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1456 VUpNzsbl.exe -
Loads dropped DLL 2 IoCs
pid Process 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe VUpNzsbl.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe VUpNzsbl.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe VUpNzsbl.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe VUpNzsbl.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe VUpNzsbl.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe VUpNzsbl.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe VUpNzsbl.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe VUpNzsbl.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe VUpNzsbl.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE VUpNzsbl.exe File opened for modification C:\Program Files\7-Zip\7z.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe VUpNzsbl.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe VUpNzsbl.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE VUpNzsbl.exe File opened for modification C:\Program Files\Windows Mail\wab.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe VUpNzsbl.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe VUpNzsbl.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe VUpNzsbl.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe VUpNzsbl.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe VUpNzsbl.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\chrome_installer.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE VUpNzsbl.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe VUpNzsbl.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe VUpNzsbl.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe VUpNzsbl.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe VUpNzsbl.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe VUpNzsbl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1456 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe 27 PID 1408 wrote to memory of 1456 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe 27 PID 1408 wrote to memory of 1456 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe 27 PID 1408 wrote to memory of 1456 1408 8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe 27 PID 1456 wrote to memory of 1640 1456 VUpNzsbl.exe 30 PID 1456 wrote to memory of 1640 1456 VUpNzsbl.exe 30 PID 1456 wrote to memory of 1640 1456 VUpNzsbl.exe 30 PID 1456 wrote to memory of 1640 1456 VUpNzsbl.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe"C:\Users\Admin\AppData\Local\Temp\8c79f64eb0802fac12f30aa53a832d06d0327304c9cd14005e1ab1e3e439b689.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\VUpNzsbl.exeC:\Users\Admin\AppData\Local\Temp\VUpNzsbl.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3b0333c7.bat" "3⤵PID:1640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD5296ab67fce1372bc2e54f2021e9e2f5b
SHA101cc3cffe9b92ee4dcbda03521518eaf5e79e008
SHA2563b844e2d4a09a4a165227dba58b3a65014434dd7b983c5dd8bfc636395048d67
SHA5125094ab90d56a5f7fa703cdfd74164246b7b73878bc9befa60fce2fc36849ed262f7000a3da42a589583aab77fb0ac7db7fb9d569cba47393ca79663110729243
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e