Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 21:24

General

  • Target

    8ea0104200c54d3b95cb9b0ba02c591f6a9715a15965f687a132c05f763274f4.exe

  • Size

    276KB

  • MD5

    912d802e210eb92575f5b15d9a99c36c

  • SHA1

    772eaed99ce1b61b960f6febf01649e20da4b97c

  • SHA256

    8ea0104200c54d3b95cb9b0ba02c591f6a9715a15965f687a132c05f763274f4

  • SHA512

    42876f82029c65fe0e443d7431500762c5c30e8c0c2a8cd2dd9d8ff8fff25ad3eb03ad1de83463b506d1a5d3971a7469fa3e0464c8f78734338a2be44c1eb446

  • SSDEEP

    1536:C1cu8WexAS6XmKvhIMfoJUhSU6nPlTggJ2oj71BgR/Vp8dY1J7iS9KcNjkhWh1Hl:CrZ3lhzslTZJ9j7Heb8C1JCcFrhx+K

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ea0104200c54d3b95cb9b0ba02c591f6a9715a15965f687a132c05f763274f4.exe
    "C:\Users\Admin\AppData\Local\Temp\8ea0104200c54d3b95cb9b0ba02c591f6a9715a15965f687a132c05f763274f4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Windows\SysWOW64\mmc.exe
      "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\system32\mmc.exe
        "C:\Windows\system32\eventvwr.msc" "C:\Windows\system32\eventvwr.msc"
        3⤵
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/936-59-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmp

    Filesize

    8KB

  • memory/936-60-0x000007FEF4360000-0x000007FEF4D83000-memory.dmp

    Filesize

    10.1MB

  • memory/936-61-0x000007FEEE750000-0x000007FEEF7E6000-memory.dmp

    Filesize

    16.6MB

  • memory/936-62-0x0000000002FE8000-0x0000000003007000-memory.dmp

    Filesize

    124KB

  • memory/936-63-0x0000000002FE8000-0x0000000003007000-memory.dmp

    Filesize

    124KB

  • memory/1380-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB

  • memory/1380-56-0x0000000001000000-0x000000000101F000-memory.dmp

    Filesize

    124KB