Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 05:06

General

  • Target

    eff19bfa920c37e67e842d2e79fdda13e012fa83f6e47b9da95c15dbb7ec75c2.exe

  • Size

    156KB

  • MD5

    928238a139d51f4e51e709eecddba6f0

  • SHA1

    3842cb5da68ca86168c83779bf55067b5b82119f

  • SHA256

    eff19bfa920c37e67e842d2e79fdda13e012fa83f6e47b9da95c15dbb7ec75c2

  • SHA512

    dc1c9a9e9c71c54ab09773aa0bcb0391940af14426270af2fe571b2ae8c3d3a0491bc7d0f9196b92ccceea1a07e385bcca96e66629309f136a094d47e39a1157

  • SSDEEP

    1536:VoybwEF5//67NxkiQixA+alh98r8Y9USv1jy7wo7JaS3cCMop32+:V/bwEFF/67gjH8ri8iwQ6hoJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eff19bfa920c37e67e842d2e79fdda13e012fa83f6e47b9da95c15dbb7ec75c2.exe
    "C:\Users\Admin\AppData\Local\Temp\eff19bfa920c37e67e842d2e79fdda13e012fa83f6e47b9da95c15dbb7ec75c2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\temug.exe
      "C:\Users\Admin\temug.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\temug.exe

    Filesize

    156KB

    MD5

    9e3bb916d70f306cd605908f29adce3e

    SHA1

    3fa000daef2944cf9aa989d5c2876e7e96992b62

    SHA256

    4b03c80b97073a6e2af699830146ac656e1ade2cdd6f4857d3175c64b65a6823

    SHA512

    d52cef31d18ee2e9f289da55fdcac08008b63c59c2046a9f453d3aeb4f06d9e17c6c684b66345f61d3729f9f414d45fd1c427d78f61fe42908db0c5a8e153f25

  • C:\Users\Admin\temug.exe

    Filesize

    156KB

    MD5

    9e3bb916d70f306cd605908f29adce3e

    SHA1

    3fa000daef2944cf9aa989d5c2876e7e96992b62

    SHA256

    4b03c80b97073a6e2af699830146ac656e1ade2cdd6f4857d3175c64b65a6823

    SHA512

    d52cef31d18ee2e9f289da55fdcac08008b63c59c2046a9f453d3aeb4f06d9e17c6c684b66345f61d3729f9f414d45fd1c427d78f61fe42908db0c5a8e153f25

  • \Users\Admin\temug.exe

    Filesize

    156KB

    MD5

    9e3bb916d70f306cd605908f29adce3e

    SHA1

    3fa000daef2944cf9aa989d5c2876e7e96992b62

    SHA256

    4b03c80b97073a6e2af699830146ac656e1ade2cdd6f4857d3175c64b65a6823

    SHA512

    d52cef31d18ee2e9f289da55fdcac08008b63c59c2046a9f453d3aeb4f06d9e17c6c684b66345f61d3729f9f414d45fd1c427d78f61fe42908db0c5a8e153f25

  • \Users\Admin\temug.exe

    Filesize

    156KB

    MD5

    9e3bb916d70f306cd605908f29adce3e

    SHA1

    3fa000daef2944cf9aa989d5c2876e7e96992b62

    SHA256

    4b03c80b97073a6e2af699830146ac656e1ade2cdd6f4857d3175c64b65a6823

    SHA512

    d52cef31d18ee2e9f289da55fdcac08008b63c59c2046a9f453d3aeb4f06d9e17c6c684b66345f61d3729f9f414d45fd1c427d78f61fe42908db0c5a8e153f25

  • memory/1928-56-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1928-57-0x0000000074AD1000-0x0000000074AD3000-memory.dmp

    Filesize

    8KB

  • memory/1928-65-0x0000000002B00000-0x0000000002B28000-memory.dmp

    Filesize

    160KB

  • memory/1928-66-0x0000000002B00000-0x0000000002B28000-memory.dmp

    Filesize

    160KB

  • memory/1928-69-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2016-67-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2016-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB