Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 15:14

General

  • Target

    0edcbb300e24c70e14717d0ea33ea46ed49636b70f9e1dde85bc75b652c683e7.exe

  • Size

    212KB

  • MD5

    0cdd1e423313376c9bf60e364716bfb0

  • SHA1

    abf926def7f9d2bd6586c42f6110a06410b56dac

  • SHA256

    0edcbb300e24c70e14717d0ea33ea46ed49636b70f9e1dde85bc75b652c683e7

  • SHA512

    8575ab627212634f017ac6508f38e24a3ba8079e97c0f76e0b5675eba9c6947f2828228d26f5a9214be4e92be9ed2dadb9ecb51704b4827f14c9b3469bc7ffdf

  • SSDEEP

    6144:dO2OG4GkabKnvmb7/D26s7olvW47imsG7CgHE9roWkw8e5SG:dOvP5abKnvmb7/D26l7jsGegHECRPG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0edcbb300e24c70e14717d0ea33ea46ed49636b70f9e1dde85bc75b652c683e7.exe
    "C:\Users\Admin\AppData\Local\Temp\0edcbb300e24c70e14717d0ea33ea46ed49636b70f9e1dde85bc75b652c683e7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\sccow.exe
      "C:\Users\Admin\sccow.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sccow.exe

    Filesize

    212KB

    MD5

    13cc3289e2597f5f5d79db6b87bc2471

    SHA1

    31333fa96d356744724130d62040493a3a4c87f8

    SHA256

    a5c33f02dd50810e38a65094f471a765c312ef0cf0fa77a04ceaeff79b6134d2

    SHA512

    1c0e8ff6c2617a084f810fd4caac72e2057e76306db52f253818ea7419a8f8d92f17bcd734747ee37c1e3509c56bf59894b35abf308307d86c045883b7fdbf1e

  • C:\Users\Admin\sccow.exe

    Filesize

    212KB

    MD5

    13cc3289e2597f5f5d79db6b87bc2471

    SHA1

    31333fa96d356744724130d62040493a3a4c87f8

    SHA256

    a5c33f02dd50810e38a65094f471a765c312ef0cf0fa77a04ceaeff79b6134d2

    SHA512

    1c0e8ff6c2617a084f810fd4caac72e2057e76306db52f253818ea7419a8f8d92f17bcd734747ee37c1e3509c56bf59894b35abf308307d86c045883b7fdbf1e

  • \Users\Admin\sccow.exe

    Filesize

    212KB

    MD5

    13cc3289e2597f5f5d79db6b87bc2471

    SHA1

    31333fa96d356744724130d62040493a3a4c87f8

    SHA256

    a5c33f02dd50810e38a65094f471a765c312ef0cf0fa77a04ceaeff79b6134d2

    SHA512

    1c0e8ff6c2617a084f810fd4caac72e2057e76306db52f253818ea7419a8f8d92f17bcd734747ee37c1e3509c56bf59894b35abf308307d86c045883b7fdbf1e

  • \Users\Admin\sccow.exe

    Filesize

    212KB

    MD5

    13cc3289e2597f5f5d79db6b87bc2471

    SHA1

    31333fa96d356744724130d62040493a3a4c87f8

    SHA256

    a5c33f02dd50810e38a65094f471a765c312ef0cf0fa77a04ceaeff79b6134d2

    SHA512

    1c0e8ff6c2617a084f810fd4caac72e2057e76306db52f253818ea7419a8f8d92f17bcd734747ee37c1e3509c56bf59894b35abf308307d86c045883b7fdbf1e

  • memory/1808-56-0x0000000076171000-0x0000000076173000-memory.dmp

    Filesize

    8KB