Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 13:07 UTC

General

  • Target

    89caaf48d98052efd16194c60017beac31946b906aa29a564a96b9af5b5b189f.exe

  • Size

    334KB

  • MD5

    0efd3a0125f336e49c14d2a87dc22802

  • SHA1

    05339ba9a1c955e176ae52deb35f72df10b7803f

  • SHA256

    89caaf48d98052efd16194c60017beac31946b906aa29a564a96b9af5b5b189f

  • SHA512

    879ad312a299123556f5b6e254223c85b6e321f52c08aed4c9a1f9470314d22e25a68c983d57fa4019f4f78350ad194569bdf39dfa76f1779751d1b5d9f1810d

  • SSDEEP

    6144:gDCwfG1bnxG8M58+DCwfG1bnxG8M58FqvA:g72bnI55X72bnI55cqvA

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89caaf48d98052efd16194c60017beac31946b906aa29a564a96b9af5b5b189f.exe
    "C:\Users\Admin\AppData\Local\Temp\89caaf48d98052efd16194c60017beac31946b906aa29a564a96b9af5b5b189f.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Windows\SysWOW64\REG.exe
      REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
      2⤵
      • Modifies registry key
      PID:896
    • C:\Users\Admin\AppData\Local\Temp\avscan.exe
      C:\Users\Admin\AppData\Local\Temp\avscan.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Users\Admin\AppData\Local\Temp\avscan.exe
        C:\Users\Admin\AppData\Local\Temp\avscan.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1776
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\windows\W_X_C.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\windows\hosts.exe
          C:\windows\hosts.exe
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Users\Admin\AppData\Local\Temp\avscan.exe
            C:\Users\Admin\AppData\Local\Temp\avscan.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1380
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c c:\windows\W_X_C.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1892
            • C:\windows\hosts.exe
              C:\windows\hosts.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1092
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
              6⤵
              • Adds policy Run key to start application
              PID:1136
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:1868
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:756
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:1508
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:1576
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
          4⤵
          • Adds policy Run key to start application
          PID:1980
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1176
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1100
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1020
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1612
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\windows\W_X_C.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\windows\hosts.exe
        C:\windows\hosts.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1760
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
        3⤵
        • Adds policy Run key to start application
        PID:1492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    717KB

    MD5

    539650a579ab6cfecddd227475515563

    SHA1

    391d3f45cf6e3c450bf05f9822eb29c1b32b9fdf

    SHA256

    fb5ace565f810e9d5c99b6eb775327c8872f3689f2738dfb5efe1c62a7a8d425

    SHA512

    7a0b52ed8aa4707d1dc188e32b81d9a025d5aca167a2c3da915806ffadfac88006a6b26477ad0c8c1fd68888739b0a7b548806ad8bc69caeec8232068922c030

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    1.4MB

    MD5

    faaf04b06e5df9a66f88924b49033b98

    SHA1

    9edd9f18a355815a904fc6ce6327d3ef0885fc84

    SHA256

    954767a4a24c244077b9e3ee99875a79ab1c9722eadff45f74f34fe298258f6b

    SHA512

    3e80c3c196f3bed2888734dd449ad3b38c2bbf5e1dad8eac30024c4cf3e20a9dc6436b96fc9183db46049303dc8f4968213d99e0cd46cf2330e1c3e6587243d1

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    2.0MB

    MD5

    7ee8a02dd0871b1d000a71fc993fbd0e

    SHA1

    065e1ee413ece5f18c084acd40e59c3d0b889b6c

    SHA256

    6878e3396b749cd535167588b00de8ee083354b1191da1b59f89c39de130623a

    SHA512

    42f82dc16e758523830e22e86851f61a3fcefe5e94b6a75d37ff6079446aef3b1f6ca945e0728710bd4d1b3611467edb4137e3159377da896ee9141b94449937

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    2.0MB

    MD5

    7bd17439b466b699743a1be755033347

    SHA1

    d39a3ca75f3ba5275404344c9561d52be8e77003

    SHA256

    517c2d70a94fcd71ab70f2f492fda2027abf5f4856e9022020ddcf2d57d5a4c9

    SHA512

    9fb539423e9d4206a988ed57d679b69ba116ef0aa10087d4aeef7f7cef0f7da56fac588f54ddb954b8d6ab77d1c4180df281c0057616f9e2a9a0abfc77ebd3bb

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    2.7MB

    MD5

    f9111df9563daf3d924f3ba138e4449e

    SHA1

    c0bf5d0b40bbdbe8ab14d3580ab2c385f6a16fd4

    SHA256

    16dda5b0686150f81d393d2787c3a0fd347abc8078be09d19ce938a3f501ab99

    SHA512

    49821b1684179061986199da69e33d3895e365b20a4c4ee6a15a68b647a55bcc8889098ecf7082437e041e568ed9d074bd0d8785713fe1c40dbf898b12746ac9

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    2.7MB

    MD5

    7056b4441f2d570c88d41647244b60ab

    SHA1

    e0b983239b84f71fa54f2c5199fd33bbd2348917

    SHA256

    89b6a15415ddd5b1ca00490145f584c2a12dd7a2dc89ccdcf85912be09241bfc

    SHA512

    d7ba9ffadb69555ae2bb0c8beb1787129bba4879414af1beb418ba15dba3abdf804f132acdbfe6ec1c5751903b7535427fa56eba8fb6a67e93b69430ef2febfc

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • C:\Windows\W_X_C.vbs

    Filesize

    195B

    MD5

    8efab902a61f6cddc318bb5818c2f2e0

    SHA1

    9608751279ae04ba710d84c61e3937c12950b393

    SHA256

    a81d0e86c651ead3e4d9c7f64e637006e787c81c8ba3e784648c2786306bfb87

    SHA512

    aabd0e45609a39584c68c35e16124b399e9a4932bf6c98c22aa8c6ff71b2fbfc80333102960fcfca1abb38b344245f9cdf4cdc0c827c48235f618011a5fbfe18

  • C:\Windows\hosts.exe

    Filesize

    334KB

    MD5

    35205f8b0c8ab307bca126269217cc89

    SHA1

    95b70d5b8d67b5ae0b6fca495379c793beb5b8ce

    SHA256

    544cdfddc700ddfaa4bdd792b58eb25f90d80b686ddfee79f43be23da701d7f7

    SHA512

    2d8cd3373b2afe184ed3fe2794122f94a7e8cd6128b36ed229017cffdd836c1ebce361fe0d77eb586d769bd934395e34dfe2f6fb10e8aee8324e1a4abc2ea377

  • C:\Windows\hosts.exe

    Filesize

    334KB

    MD5

    35205f8b0c8ab307bca126269217cc89

    SHA1

    95b70d5b8d67b5ae0b6fca495379c793beb5b8ce

    SHA256

    544cdfddc700ddfaa4bdd792b58eb25f90d80b686ddfee79f43be23da701d7f7

    SHA512

    2d8cd3373b2afe184ed3fe2794122f94a7e8cd6128b36ed229017cffdd836c1ebce361fe0d77eb586d769bd934395e34dfe2f6fb10e8aee8324e1a4abc2ea377

  • C:\Windows\hosts.exe

    Filesize

    334KB

    MD5

    35205f8b0c8ab307bca126269217cc89

    SHA1

    95b70d5b8d67b5ae0b6fca495379c793beb5b8ce

    SHA256

    544cdfddc700ddfaa4bdd792b58eb25f90d80b686ddfee79f43be23da701d7f7

    SHA512

    2d8cd3373b2afe184ed3fe2794122f94a7e8cd6128b36ed229017cffdd836c1ebce361fe0d77eb586d769bd934395e34dfe2f6fb10e8aee8324e1a4abc2ea377

  • C:\Windows\hosts.exe

    Filesize

    334KB

    MD5

    35205f8b0c8ab307bca126269217cc89

    SHA1

    95b70d5b8d67b5ae0b6fca495379c793beb5b8ce

    SHA256

    544cdfddc700ddfaa4bdd792b58eb25f90d80b686ddfee79f43be23da701d7f7

    SHA512

    2d8cd3373b2afe184ed3fe2794122f94a7e8cd6128b36ed229017cffdd836c1ebce361fe0d77eb586d769bd934395e34dfe2f6fb10e8aee8324e1a4abc2ea377

  • C:\windows\hosts.exe

    Filesize

    334KB

    MD5

    35205f8b0c8ab307bca126269217cc89

    SHA1

    95b70d5b8d67b5ae0b6fca495379c793beb5b8ce

    SHA256

    544cdfddc700ddfaa4bdd792b58eb25f90d80b686ddfee79f43be23da701d7f7

    SHA512

    2d8cd3373b2afe184ed3fe2794122f94a7e8cd6128b36ed229017cffdd836c1ebce361fe0d77eb586d769bd934395e34dfe2f6fb10e8aee8324e1a4abc2ea377

  • \??\c:\windows\W_X_C.bat

    Filesize

    336B

    MD5

    4db9f8b6175722b62ececeeeba1ce307

    SHA1

    3b3ba8414706e72a6fa19e884a97b87609e11e47

    SHA256

    d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78

    SHA512

    1d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    334KB

    MD5

    9f3f389429f4e2aa176873276285a9ba

    SHA1

    f322c4dc661aa32c21f461b7f476f296a689919d

    SHA256

    f3a21706b199c77c956b735690ac7d6a6b8a86f72133aaeb1ce11b6b8d73413b

    SHA512

    75a91d0f8633f21cdec0aa842de47f43d6552cd3044b9784dc95742f09c4da4e4b25d265a86a49cbdd987fdd49fa3ca7bf3582e1bbac033298bb7dff045f9664

  • memory/1156-58-0x0000000074571000-0x0000000074573000-memory.dmp

    Filesize

    8KB

  • memory/1156-56-0x0000000076461000-0x0000000076463000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.