Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 07:36

General

  • Target

    5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe

  • Size

    92KB

  • MD5

    93d63b733d33f4c64488d5854f962c00

  • SHA1

    63d86ec9a0773d108efc1b12b3446cd8d312bb55

  • SHA256

    5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a

  • SHA512

    3d93846b88ceb0618e7d4193aa0b99a876169db05cbf75e5bf991a957c808ce58180c219815b9908ac53d25a82e58231abf0252b15b95c06cb7b8d511c6340b2

  • SSDEEP

    1536:nj2AwKrSEqxQxK+oyEIXQ7+JLIzbPhwxw8lepaptXN883IPpLh29JbbEokDU:j2AwNc0AXQ7+crmVokpNSxTABt

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe
    "C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\eidolon.exe
      "C:\Users\Admin\AppData\Local\Temp\eidolon.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:1120
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Windows\temp\tttdelzzz.bat" "
      2⤵
      • Deletes itself
      PID:964
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Windows\temp\tttbrozzz.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe
        "C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe"
        3⤵
        • Executes dropped EXE
        PID:908
      • C:\Users\Admin\AppData\Local\Temp\USBServers32.exe
        "C:\Users\Admin\AppData\Local\Temp\USBServers32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1336
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\windows\currentVersion\run /v USBServers32 /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\USBServers32.exe" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:848
          • C:\Windows\SysWOW64\reg.exe
            reg add HKEY_CURRENT_USER\Software\Microsoft\windows\currentVersion\run /v USBServers32 /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\USBServers32.exe" /f
            5⤵
            • Adds Run key to start application
            PID:524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe

    Filesize

    37KB

    MD5

    fd9aa418a3248e939b2e3c045d606e92

    SHA1

    fcdbbb36b74f19406278db05919e64d449adbb41

    SHA256

    899f0f597f01d496a4bdfb8e0185a0a3ba68967d98079589e80de192fc035703

    SHA512

    977f22cfb94a0e3aede44a17134298dab2d4ca5f74e62e0b0d62a869e4173d82fe67d669968c3e353fef2e15082f8e1705d05664a56784695fefa565e2c262fa

  • C:\Users\Admin\AppData\Local\Temp\USBServers32.exe

    Filesize

    54KB

    MD5

    6428b1de8971e837926de5b464725f64

    SHA1

    19d7ce6fff617b790f9de7bf99406e61061f0594

    SHA256

    8f53ab3cd172f685568e0cbb51eb7dfd2389a5fe6aaf47d0aa7d823253e673ee

    SHA512

    7938b01ce48bcdd3276c83f82fc71407d101f2e884b3f271a17fcf4c60af642faf57047edab97906351217f79847107757283af3fbfc3059cf4eb8e8d778d026

  • C:\Users\Admin\AppData\Local\Temp\USBServers32.exe

    Filesize

    54KB

    MD5

    6428b1de8971e837926de5b464725f64

    SHA1

    19d7ce6fff617b790f9de7bf99406e61061f0594

    SHA256

    8f53ab3cd172f685568e0cbb51eb7dfd2389a5fe6aaf47d0aa7d823253e673ee

    SHA512

    7938b01ce48bcdd3276c83f82fc71407d101f2e884b3f271a17fcf4c60af642faf57047edab97906351217f79847107757283af3fbfc3059cf4eb8e8d778d026

  • C:\Users\Admin\AppData\Local\Temp\eidolon.exe

    Filesize

    24KB

    MD5

    f3858fb30c8ddb74a11e85381009c438

    SHA1

    ab388dbb45109acd543d28030daf065e50e20a1b

    SHA256

    a1bf9bc23f97fee5a83ddcb3ba4d8fbbcc70fb2d871b325261be0ded72196fe9

    SHA512

    6aeb783c6ed7108480f956fd5b54a39a26d6257dc1c472d4d16700eb76be4276690596702fbc9a078662627673965584accf90449cd08dec461806ae3d57c0d1

  • C:\Windows\temp\Server32History.dat

    Filesize

    37KB

    MD5

    fd9aa418a3248e939b2e3c045d606e92

    SHA1

    fcdbbb36b74f19406278db05919e64d449adbb41

    SHA256

    899f0f597f01d496a4bdfb8e0185a0a3ba68967d98079589e80de192fc035703

    SHA512

    977f22cfb94a0e3aede44a17134298dab2d4ca5f74e62e0b0d62a869e4173d82fe67d669968c3e353fef2e15082f8e1705d05664a56784695fefa565e2c262fa

  • C:\Windows\temp\tttbrozzz.bat

    Filesize

    619B

    MD5

    11c954df2747603320031048077a43c9

    SHA1

    a3ba7949ffc100f0a131dbaa57641902291f28b7

    SHA256

    7fad654a85cd8b48cf5ce4338857c9dcda8998f6e796bd0cf4dc90173995cc5d

    SHA512

    d75d6a02843d1129ded907cc0f52203183c536daffc31dccf56b76df8053aba8b9dd04a8571631b1c8006fca414057833095247d4656cf1e68cd59374e4045b6

  • C:\Windows\temp\tttdelzzz.bat

    Filesize

    327B

    MD5

    d7ae40d256a0f06d26c9ff7d59b5f469

    SHA1

    1a36f1c0ed778f30eaf8bce42503dca035652b4e

    SHA256

    214f2b425582c51ae12d7d77f2a885ccd670412aaa5d31ebdcc3c3acc27f5177

    SHA512

    34f819d6ba271de830ed711c376953f7d2d537e3f3cfe1739cbb54aef47b5603e2b0053ee21c2b9a334b88df64683a517d655eaec8bc91777dac4b0c86f2d5cb

  • \Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe

    Filesize

    37KB

    MD5

    fd9aa418a3248e939b2e3c045d606e92

    SHA1

    fcdbbb36b74f19406278db05919e64d449adbb41

    SHA256

    899f0f597f01d496a4bdfb8e0185a0a3ba68967d98079589e80de192fc035703

    SHA512

    977f22cfb94a0e3aede44a17134298dab2d4ca5f74e62e0b0d62a869e4173d82fe67d669968c3e353fef2e15082f8e1705d05664a56784695fefa565e2c262fa

  • \Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe

    Filesize

    37KB

    MD5

    fd9aa418a3248e939b2e3c045d606e92

    SHA1

    fcdbbb36b74f19406278db05919e64d449adbb41

    SHA256

    899f0f597f01d496a4bdfb8e0185a0a3ba68967d98079589e80de192fc035703

    SHA512

    977f22cfb94a0e3aede44a17134298dab2d4ca5f74e62e0b0d62a869e4173d82fe67d669968c3e353fef2e15082f8e1705d05664a56784695fefa565e2c262fa

  • \Users\Admin\AppData\Local\Temp\USBServers32.exe

    Filesize

    54KB

    MD5

    6428b1de8971e837926de5b464725f64

    SHA1

    19d7ce6fff617b790f9de7bf99406e61061f0594

    SHA256

    8f53ab3cd172f685568e0cbb51eb7dfd2389a5fe6aaf47d0aa7d823253e673ee

    SHA512

    7938b01ce48bcdd3276c83f82fc71407d101f2e884b3f271a17fcf4c60af642faf57047edab97906351217f79847107757283af3fbfc3059cf4eb8e8d778d026

  • \Users\Admin\AppData\Local\Temp\USBServers32.exe

    Filesize

    54KB

    MD5

    6428b1de8971e837926de5b464725f64

    SHA1

    19d7ce6fff617b790f9de7bf99406e61061f0594

    SHA256

    8f53ab3cd172f685568e0cbb51eb7dfd2389a5fe6aaf47d0aa7d823253e673ee

    SHA512

    7938b01ce48bcdd3276c83f82fc71407d101f2e884b3f271a17fcf4c60af642faf57047edab97906351217f79847107757283af3fbfc3059cf4eb8e8d778d026

  • \Users\Admin\AppData\Local\Temp\eidolon.exe

    Filesize

    24KB

    MD5

    f3858fb30c8ddb74a11e85381009c438

    SHA1

    ab388dbb45109acd543d28030daf065e50e20a1b

    SHA256

    a1bf9bc23f97fee5a83ddcb3ba4d8fbbcc70fb2d871b325261be0ded72196fe9

    SHA512

    6aeb783c6ed7108480f956fd5b54a39a26d6257dc1c472d4d16700eb76be4276690596702fbc9a078662627673965584accf90449cd08dec461806ae3d57c0d1

  • \Users\Admin\AppData\Local\Temp\eidolon.exe

    Filesize

    24KB

    MD5

    f3858fb30c8ddb74a11e85381009c438

    SHA1

    ab388dbb45109acd543d28030daf065e50e20a1b

    SHA256

    a1bf9bc23f97fee5a83ddcb3ba4d8fbbcc70fb2d871b325261be0ded72196fe9

    SHA512

    6aeb783c6ed7108480f956fd5b54a39a26d6257dc1c472d4d16700eb76be4276690596702fbc9a078662627673965584accf90449cd08dec461806ae3d57c0d1

  • memory/1016-54-0x0000000075F51000-0x0000000075F53000-memory.dmp

    Filesize

    8KB