Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 11:27

General

  • Target

    f4483ecb9fbb74bfb588c7f8497d96d862187819634d9cef5abac4128bf9f686.exe

  • Size

    256KB

  • MD5

    0c16f6ff28c97f82ca78ab7e1c56222a

  • SHA1

    06a61d92153e5382cff415c99eed66006c627190

  • SHA256

    f4483ecb9fbb74bfb588c7f8497d96d862187819634d9cef5abac4128bf9f686

  • SHA512

    65faa58680dfe9bf63dc3c7c77386b87cbf975ef53ed20aa330631f775b3c8062326a870c1b5e10e53beeeda8f0b42da0cea4cf93b74ce2831ddda4635d05b28

  • SSDEEP

    6144:hVEuQZUvhOoOirF1rsNjqH94M7RNo913Ml2Knvmb7/D26QkQeOzRAa:PQZUvhOoOMF1rsNjqgH3Ml2Knvmb7/Dq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4483ecb9fbb74bfb588c7f8497d96d862187819634d9cef5abac4128bf9f686.exe
    "C:\Users\Admin\AppData\Local\Temp\f4483ecb9fbb74bfb588c7f8497d96d862187819634d9cef5abac4128bf9f686.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\looupo.exe
      "C:\Users\Admin\looupo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\looupo.exe

    Filesize

    256KB

    MD5

    70a90f9d2f21c91d7be0d6feb121e28e

    SHA1

    381de542d0760779fc415fd30817adf1a1f6c547

    SHA256

    beff6050e11f4096d3c13f12e96308bf9b4685139b9cf20e6db2d4b002654995

    SHA512

    fff14489744e30bbe3cd3aef3ebb2dfebf210c3ac71041f0096e734f62e847d34d341f650b96c1bb4bcbdd297b4a8302bb4511024f0659827c1ddffd3b24b9da

  • C:\Users\Admin\looupo.exe

    Filesize

    256KB

    MD5

    70a90f9d2f21c91d7be0d6feb121e28e

    SHA1

    381de542d0760779fc415fd30817adf1a1f6c547

    SHA256

    beff6050e11f4096d3c13f12e96308bf9b4685139b9cf20e6db2d4b002654995

    SHA512

    fff14489744e30bbe3cd3aef3ebb2dfebf210c3ac71041f0096e734f62e847d34d341f650b96c1bb4bcbdd297b4a8302bb4511024f0659827c1ddffd3b24b9da

  • \Users\Admin\looupo.exe

    Filesize

    256KB

    MD5

    70a90f9d2f21c91d7be0d6feb121e28e

    SHA1

    381de542d0760779fc415fd30817adf1a1f6c547

    SHA256

    beff6050e11f4096d3c13f12e96308bf9b4685139b9cf20e6db2d4b002654995

    SHA512

    fff14489744e30bbe3cd3aef3ebb2dfebf210c3ac71041f0096e734f62e847d34d341f650b96c1bb4bcbdd297b4a8302bb4511024f0659827c1ddffd3b24b9da

  • \Users\Admin\looupo.exe

    Filesize

    256KB

    MD5

    70a90f9d2f21c91d7be0d6feb121e28e

    SHA1

    381de542d0760779fc415fd30817adf1a1f6c547

    SHA256

    beff6050e11f4096d3c13f12e96308bf9b4685139b9cf20e6db2d4b002654995

    SHA512

    fff14489744e30bbe3cd3aef3ebb2dfebf210c3ac71041f0096e734f62e847d34d341f650b96c1bb4bcbdd297b4a8302bb4511024f0659827c1ddffd3b24b9da

  • memory/1672-56-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

    Filesize

    8KB