Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 14:35

General

  • Target

    967e46e510ca3cc841111bdcfcd85301fdbf9e6062f02bfac3f6d10ef0d618a8.exe

  • Size

    270KB

  • MD5

    a2f50300046583a2666dcfa114fe13d0

  • SHA1

    d13e61e45c8c69406e3c534b1c94615d836df746

  • SHA256

    967e46e510ca3cc841111bdcfcd85301fdbf9e6062f02bfac3f6d10ef0d618a8

  • SHA512

    e734e61da907b6ce374bafd1f38f8c605ad6434b59c1503d3813524fc1e113cf979ce051fe72379b34c0ead615067acb629f4bb7010e853ab5daef9f4d6d8654

  • SSDEEP

    3072:4xRDEbFUwUDxNQccrLPdKMCtuy4CWQ1NORruIJ9FqZWL+5bAhBwQnR+jkau6Pk:CDEpUdOPdKMCMrC1+RzFqftAznIjkn7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\967e46e510ca3cc841111bdcfcd85301fdbf9e6062f02bfac3f6d10ef0d618a8.exe
    "C:\Users\Admin\AppData\Local\Temp\967e46e510ca3cc841111bdcfcd85301fdbf9e6062f02bfac3f6d10ef0d618a8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Users\Admin\AppData\Roaming\Trojan.exe
        "C:\Users\Admin\AppData\Roaming\Trojan.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Trojan.exe" "Trojan.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • C:\Users\Admin\AppData\Roaming\Trojan.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • C:\Users\Admin\AppData\Roaming\Trojan.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • \Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • \Users\Admin\AppData\Roaming\Trojan.exe

    Filesize

    235KB

    MD5

    c0026d5f463e02bb5aa948af6953a3ab

    SHA1

    60ab29a7d9a9b94d1b810b6ce9f0d153fc7c6f78

    SHA256

    41a6259380a19f0c22045d7c98bd64229fd4894b6d0b1099da70380704a1c769

    SHA512

    a4686b4b903b9364d1fc99587fa187cd889e20290aea5f9a790c2342c822d278bb68ea7f112123582449a89d88ff312578a810b85b3ffb1402ccbf8319b6e531

  • memory/1116-91-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-96-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-64-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-65-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-66-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-67-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-68-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-69-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-70-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-71-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-72-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-73-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-74-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-76-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-77-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-75-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-78-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-95-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-80-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-81-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-82-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-83-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-84-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-85-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-86-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-87-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-88-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-89-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-90-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-62-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-92-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-93-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-63-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-94-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-79-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-98-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-99-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-100-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-101-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-97-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-103-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-104-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-105-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-102-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-107-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-108-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-109-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-106-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-111-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-112-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-113-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-110-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-114-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-115-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-116-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-117-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-118-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-119-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-120-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1116-145-0x0000000074210000-0x00000000747BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1116-152-0x0000000074210000-0x00000000747BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1116-58-0x00000000003B0000-0x00000000003DC000-memory.dmp

    Filesize

    176KB

  • memory/1448-54-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB

  • memory/1928-238-0x0000000073C60000-0x000000007420B000-memory.dmp

    Filesize

    5.7MB

  • memory/1928-242-0x0000000073C60000-0x000000007420B000-memory.dmp

    Filesize

    5.7MB