Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 15:04

General

  • Target

    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe

  • Size

    640KB

  • MD5

    82a76655f9d478df789133e5023a6c71

  • SHA1

    32060f686b335039cd06cd6aed41db169e05fa4a

  • SHA256

    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17

  • SHA512

    0867f210868114733244c9822f680639f82c1ed04aa56f0a786810400818afd7193c88a570953936f41173c5d473b8851684bd79fbb12df4543268913594dafd

  • SSDEEP

    6144:nFYFN2CESrfI067dvxzEqjC0nzHHGSukYJ2cKLERd3lhv1do8hl3Xe69Ufcky:nFMocfIv7DzEqjrn2twEj3v1PNky

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    "C:\Users\Admin\AppData\Local\Temp\e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.v989.com/?xy
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1080 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HF73UIE2.txt

    Filesize

    606B

    MD5

    6cb5f5f39267510ff586e390348cddf9

    SHA1

    1ac275a3ab3a6dc7f1676e811c3680ab8aff546f

    SHA256

    fa5e995e6d7963cce40ac91b96bb1c4d97b9653ae13616bbdc238af70ee85a8f

    SHA512

    e4451925cbe631bc818b8921fa7608af74dd24c1ca7d2b10826d67d7da6f80bdec6002eb4f88d7d956c8b9311cf442f2c9d484c4fffcc1c2ee059e4e0e4d40a6

  • memory/1160-54-0x0000000076151000-0x0000000076153000-memory.dmp

    Filesize

    8KB