Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    165s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 11:17

General

  • Target

    6045f4c84d9884ced4863591d4f5d1de92b5473ff71e221a0992b730565f38f5.exe

  • Size

    941KB

  • MD5

    da438e70421f3aba0c8f797111208327

  • SHA1

    ddae71afdcb1cf566c8348314feba24f9bf943ab

  • SHA256

    6045f4c84d9884ced4863591d4f5d1de92b5473ff71e221a0992b730565f38f5

  • SHA512

    2b196df7b5df7cad8f91a57911a1c8cbc51ef79dbb6bc2b5449ed151c1f5189d6de32181f0f9f1c60b323feabbeca866ff1581177bb70c2b020346a7f0781856

  • SSDEEP

    24576:YNGsFQuK47Uh2CubV4+TQzJcrPes0pFQ97vbUkKAjG:Y8sFQ3pqbq+TYJcrW1FUj

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6045f4c84d9884ced4863591d4f5d1de92b5473ff71e221a0992b730565f38f5.exe
    "C:\Users\Admin\AppData\Local\Temp\6045f4c84d9884ced4863591d4f5d1de92b5473ff71e221a0992b730565f38f5.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.pekalongan-kommunity.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1296 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:620
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1296 CREDAT:603143 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1632
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://goo.gl/VTRUf7
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1396 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1488
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1396 CREDAT:537603 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1072
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.pekalongan-kommunity.com/
      2⤵
        PID:1924

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      340B

      MD5

      1e7ebd9baeb8ea5c970f44bc8abd107b

      SHA1

      8b0c9d384721c284c7bbdab48aada1112e33c09b

      SHA256

      aab011a7c46819f4f2af0f3691a591e3b1e7d395f78a926123d8f370eac71843

      SHA512

      7a2e9b051cb658ef8c6ecb71b6364e452e4e6706adb894799c2ecf67c0a535420113f95260b26bd08c2cc6663d9ec6dc463ce061554198bfd7c70ec270e96abc

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{44492B01-5DE1-11ED-BD84-7E4CDA66D2DC}.dat

      Filesize

      3KB

      MD5

      bd9102e72937ce4260c0d90c18b1a541

      SHA1

      c3faa9464bb6d6d691a35345c1b9cdecc0dc17d8

      SHA256

      7d6ea21a2338669a6d6c3164708293969b3574680fc2dbc6d5969ca350c646d6

      SHA512

      75946d1cedb21afe19af894272fad78a337cdf5870a76b24350539080f215f0769109e7496b838d1ec614c4bc8f3904be78c82f4a7c58cce1c9dfb5057352dfe

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{44495211-5DE1-11ED-BD84-7E4CDA66D2DC}.dat

      Filesize

      5KB

      MD5

      e64d589333d66d832ce60df425aa884e

      SHA1

      bc0356d25343e5d3807fb80d4523922c01666566

      SHA256

      dcf5b94788d40503f82a0f4b4e802146084ed413ff0d588906d5bd321116051a

      SHA512

      13badf2d972ac25f578c52e3db4e8174001f8dbb4347f3a1df577bbff308567be33ea1e20ba1318061d128be3f6b70b2a0046a79a6be7dded99057931c691fd7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OMZEV5U0.txt

      Filesize

      603B

      MD5

      ad5e9dc82ad013c4be5a2f54145266e8

      SHA1

      7428eea944a27cc01345ae78eb426dabd9dfcb25

      SHA256

      a1ffd5f07574c61f0244b0bc9cdbb0489a7ba59c56cc5014eb50cff14fa50461

      SHA512

      ff33b09323123bebcf7c821d3d3fd3aff837b4e2b74db81b667dd66e11009d52da644f7f6fd793457315618336d16517ed760192de48067adec24e8b5e67276a

    • memory/1968-54-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/1968-57-0x00000000756B1000-0x00000000756B3000-memory.dmp

      Filesize

      8KB

    • memory/1968-58-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/1968-59-0x0000000000950000-0x0000000000960000-memory.dmp

      Filesize

      64KB

    • memory/1968-64-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/1968-65-0x0000000000950000-0x0000000000960000-memory.dmp

      Filesize

      64KB