Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 05:11

General

  • Target

    974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe

  • Size

    139KB

  • MD5

    a2ac60fa95b1e2d98252b7e86e4a027e

  • SHA1

    1afcb183d78bf94b58f0ed59ebc15ba40b1b58ca

  • SHA256

    974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f

  • SHA512

    8faeb3e7f933df7e4084434636a0861a9c2e8be7f976d39c87653105eb03156797178cc4b859989d26b80bf980fe42187b8f5965fdb1d1429c15f0ad477d5aa3

  • SSDEEP

    3072:3CpRq0P0gSlzkMBEHfHa0KmRTrqeD2oWTZoN7VBRcIyOjP0aO:qlPQzK60xWoWSN7Bv

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe
    "C:\Users\Admin\AppData\Local\Temp\974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=tkFQS92d6gw
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    9360fb5dc5be77398bd0078ed99d63a1

    SHA1

    6aa4fe5e1d06b1c53d772d61554af5e27f7f46f8

    SHA256

    f01e9c4a4939684998212501d9143c6456979580375b1d11744fadf5af550d47

    SHA512

    f41447b6192704d235d9da233f35e326b13b693fd67616bc691d56233284be29028672a6d9a0913b1c951f85785c08c93d40f05d5a334d17e9f9da6248b209ed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    3ba8449b4f122cd0f49d1dca5a295f07

    SHA1

    98b9a50ab6e67e7588c067fd03d88fbe3b5b0e77

    SHA256

    1b9df084339bdf925fa78810c92d9874b38081f18cb3acc5c00969a2f9678251

    SHA512

    cd504f6dc9741c813fb3c0423297b54d4f055c395ded2c2d68448aa9fbd23b857b94355bd366f9bb9dff6e38eaf1ed38bf098707a90993a34c12fa6590f94c79

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NA2L6SCK.txt

    Filesize

    603B

    MD5

    5d542244d6b8fe1aa5e0e7018559401a

    SHA1

    572903cefe740c650467a7988a4b8fcbf5603fc3

    SHA256

    bf2d97ce932c102ee7088ee546ca4105ca92d5966ded172064ea622b22897a10

    SHA512

    ba5149fe32f848d6d20d5e3115602fa84fe62481b8c97794d0bacb598b12dc53d366213e6c002aa86615811e6c02ca65b33bca4d581ff8f594398b9c772ca551

  • memory/808-54-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/808-55-0x00000000004E0000-0x0000000000526000-memory.dmp

    Filesize

    280KB

  • memory/808-58-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB

  • memory/808-60-0x00000000004E0000-0x0000000000526000-memory.dmp

    Filesize

    280KB

  • memory/808-61-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB