Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe
Resource
win10v2004-20220901-en
General
-
Target
3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe
-
Size
111KB
-
MD5
5121973cfc3fddf89231a8620a406480
-
SHA1
5fe07c712d7108412f71f7c6207d0ac63b47ffb8
-
SHA256
3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8
-
SHA512
8ab32b053f989a42598dd0ec6d3490efbd9a79aba39def8a2595c5add13d58c0e4ed9d1475b3a5bb4c4e9a4cde56c430be37669fa261e672bc9653a9394ebe55
-
SSDEEP
3072:7S8BCfoDaXJNMX72CWzfCE5wbDwh+NUL6eR+rf:7PB6EXJWz0IQNveR8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1176 NvdUpd.exe 1492 NvdUpd.exe -
Loads dropped DLL 3 IoCs
pid Process 1248 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe 1248 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe 1248 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvUpdSrv = "C:\\Users\\Admin\\AppData\\Local\\NVIDIA Corporation\\Updates\\NvdUpd.exe" 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1176 set thread context of 1492 1176 NvdUpd.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1176 NvdUpd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1176 NvdUpd.exe 1176 NvdUpd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1176 1248 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe 26 PID 1248 wrote to memory of 1176 1248 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe 26 PID 1248 wrote to memory of 1176 1248 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe 26 PID 1248 wrote to memory of 1176 1248 3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe 26 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27 PID 1176 wrote to memory of 1492 1176 NvdUpd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe"C:\Users\Admin\AppData\Local\Temp\3a0f21b4926ea58cf88ddd0450833096ede56c60995324b56950d7b2fee7abe8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"C:\Users\Admin\AppData\Local\NVIDIA Corporation\Updates\NvdUpd.exe"3⤵
- Executes dropped EXE
PID:1492
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5245af2cdd9ca6786f779f8c04dc55f72
SHA1f42b0d775ff8ce27d0f7606fb25044104ec1fef2
SHA256cd9d5a36f77b9e44d5edca6a26ef1daa9cf8189fafe05638e608244ed71470cc
SHA512c3e0c54ad418d7487158581a696b66e4da1b318b9024e7ebe3f2450b8693b225c615486395dab23d55ffa88c7125aa70eda9c13a4bab69c5874f8f9050c5ee96
-
Filesize
89KB
MD5245af2cdd9ca6786f779f8c04dc55f72
SHA1f42b0d775ff8ce27d0f7606fb25044104ec1fef2
SHA256cd9d5a36f77b9e44d5edca6a26ef1daa9cf8189fafe05638e608244ed71470cc
SHA512c3e0c54ad418d7487158581a696b66e4da1b318b9024e7ebe3f2450b8693b225c615486395dab23d55ffa88c7125aa70eda9c13a4bab69c5874f8f9050c5ee96
-
Filesize
89KB
MD5245af2cdd9ca6786f779f8c04dc55f72
SHA1f42b0d775ff8ce27d0f7606fb25044104ec1fef2
SHA256cd9d5a36f77b9e44d5edca6a26ef1daa9cf8189fafe05638e608244ed71470cc
SHA512c3e0c54ad418d7487158581a696b66e4da1b318b9024e7ebe3f2450b8693b225c615486395dab23d55ffa88c7125aa70eda9c13a4bab69c5874f8f9050c5ee96
-
Filesize
89KB
MD5245af2cdd9ca6786f779f8c04dc55f72
SHA1f42b0d775ff8ce27d0f7606fb25044104ec1fef2
SHA256cd9d5a36f77b9e44d5edca6a26ef1daa9cf8189fafe05638e608244ed71470cc
SHA512c3e0c54ad418d7487158581a696b66e4da1b318b9024e7ebe3f2450b8693b225c615486395dab23d55ffa88c7125aa70eda9c13a4bab69c5874f8f9050c5ee96
-
Filesize
89KB
MD5245af2cdd9ca6786f779f8c04dc55f72
SHA1f42b0d775ff8ce27d0f7606fb25044104ec1fef2
SHA256cd9d5a36f77b9e44d5edca6a26ef1daa9cf8189fafe05638e608244ed71470cc
SHA512c3e0c54ad418d7487158581a696b66e4da1b318b9024e7ebe3f2450b8693b225c615486395dab23d55ffa88c7125aa70eda9c13a4bab69c5874f8f9050c5ee96
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f