Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe
Resource
win10v2004-20220901-en
General
-
Target
93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe
-
Size
207KB
-
MD5
9399e7b6aaff16cb3991886f22b9ab00
-
SHA1
6182712304dd5de97c7a5c58fbcc4c50b377a92b
-
SHA256
93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e
-
SHA512
ee6f72309b0c7bf4cec908c9d0c2dd2d740b33e54a8820335b7f2ec6beb0c6007f32c882a8679ef0f93333f665913cfbaee0acb5c1e33c5acf129350c161011b
-
SSDEEP
3072:NX7DItrfaocyTgfsqQOlJlCCsqY9P1Aq7cngeFJEjOt9FhQ/Fi48AkybWAekvwc+:NsaocyLCZs13Xcnge863opWo5j3SFBb7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1616 installer.exe 1508 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe -
Loads dropped DLL 3 IoCs
pid Process 1404 93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe 1404 93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe 1404 93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe 1508 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1616 1404 93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe 28 PID 1404 wrote to memory of 1616 1404 93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe 28 PID 1404 wrote to memory of 1616 1404 93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe 28 PID 1404 wrote to memory of 1616 1404 93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe 28 PID 1616 wrote to memory of 1508 1616 installer.exe 30 PID 1616 wrote to memory of 1508 1616 installer.exe 30 PID 1616 wrote to memory of 1508 1616 installer.exe 30 PID 1616 wrote to memory of 1508 1616 installer.exe 30 PID 1616 wrote to memory of 1508 1616 installer.exe 30 PID 1616 wrote to memory of 1508 1616 installer.exe 30 PID 1616 wrote to memory of 1508 1616 installer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe"C:\Users\Admin\AppData\Local\Temp\93ca3f63d340e0bbe1b1efc8fe60f7464639cb0d0fb8ed83fcf426318197379e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\nsdE987.tmp\installer.exeC:\Users\Admin\AppData\Local\Temp\nsdE987.tmp\installer.exe 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f /e5830644 /dT131762338S /t2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\nsdE987.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe"C:\Users\Admin\AppData\Local\Temp\nsdE987.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe" /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f /e5830644 /dT131762338S /t3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD5678d9bcf0b164946ecc4a7d422b93019
SHA1ea0dc87b3434456f22cca5b6aa76678243ceff04
SHA256f477294269369396f69f8f00db98661d2e1129c9b91d802af2509283a69ca062
SHA5124fc2c36823e32af34366d217a1ccde551d79ee7a8b4ff633eb3c6b88936bcce9c5d4426f35798744184339e5c4c0709aad16a4226b60da7cf61a2d7b73f72deb
-
Filesize
243KB
MD5678d9bcf0b164946ecc4a7d422b93019
SHA1ea0dc87b3434456f22cca5b6aa76678243ceff04
SHA256f477294269369396f69f8f00db98661d2e1129c9b91d802af2509283a69ca062
SHA5124fc2c36823e32af34366d217a1ccde551d79ee7a8b4ff633eb3c6b88936bcce9c5d4426f35798744184339e5c4c0709aad16a4226b60da7cf61a2d7b73f72deb
-
Filesize
174KB
MD59f338169d5cb0adf87025314e78be9ad
SHA11d4a15849706dfa24ed641bd46f95ef9f0a86751
SHA25656cc8358d9947423db5f7c141091c3f3d42c3e78de1a39d6d559e85fae9066ff
SHA512ece37478bd7f000aa3dbd60a22a7bca849cf7792e429d05e40766a9a4aff35979af8324348a9aba7d6c019f008b6c3d67c27a8dfcc8381c32a5d933dc556485f
-
Filesize
174KB
MD59f338169d5cb0adf87025314e78be9ad
SHA11d4a15849706dfa24ed641bd46f95ef9f0a86751
SHA25656cc8358d9947423db5f7c141091c3f3d42c3e78de1a39d6d559e85fae9066ff
SHA512ece37478bd7f000aa3dbd60a22a7bca849cf7792e429d05e40766a9a4aff35979af8324348a9aba7d6c019f008b6c3d67c27a8dfcc8381c32a5d933dc556485f
-
Filesize
174KB
MD59f338169d5cb0adf87025314e78be9ad
SHA11d4a15849706dfa24ed641bd46f95ef9f0a86751
SHA25656cc8358d9947423db5f7c141091c3f3d42c3e78de1a39d6d559e85fae9066ff
SHA512ece37478bd7f000aa3dbd60a22a7bca849cf7792e429d05e40766a9a4aff35979af8324348a9aba7d6c019f008b6c3d67c27a8dfcc8381c32a5d933dc556485f
-
Filesize
174KB
MD59f338169d5cb0adf87025314e78be9ad
SHA11d4a15849706dfa24ed641bd46f95ef9f0a86751
SHA25656cc8358d9947423db5f7c141091c3f3d42c3e78de1a39d6d559e85fae9066ff
SHA512ece37478bd7f000aa3dbd60a22a7bca849cf7792e429d05e40766a9a4aff35979af8324348a9aba7d6c019f008b6c3d67c27a8dfcc8381c32a5d933dc556485f
-
Filesize
8KB
MD5249ae678f0dac4c625c6de6aca53823a
SHA16ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201
SHA2567298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce
SHA51266e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7