Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    38s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 19:47

Errors

Reason
Machine shutdown

General

  • Target

    ff9fa217826907e15e8352afcd293b25887ca12e14baea814fa0ecf5da581aee.exe

  • Size

    929KB

  • MD5

    0f43b40d5f15e33283c6f0dd2cc84e86

  • SHA1

    6b7bb79bade4daff829704de0611b8763650e704

  • SHA256

    ff9fa217826907e15e8352afcd293b25887ca12e14baea814fa0ecf5da581aee

  • SHA512

    8d0ba92c65b18c55389adab9691ed65b74324194130fd638bf4391c09096c46b9c45e78133cbd38dd9041dd2c0cadc45ab3ebd5c0287c31063abe4f35b8b67aa

  • SSDEEP

    12288:zya4OjigvrwsuIaEUMJaKqptyLuziCKvDNgQpwKTavW2gsBb46sefiikt+GKmLPW:2a7ZvkDZnJtmeiC6BuK+CsO6mL1KuCSC

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 5 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff9fa217826907e15e8352afcd293b25887ca12e14baea814fa0ecf5da581aee.exe
    "C:\Users\Admin\AppData\Local\Temp\ff9fa217826907e15e8352afcd293b25887ca12e14baea814fa0ecf5da581aee.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s wuaueng.dll
      2⤵
      • Loads dropped DLL
      PID:856
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s c:\ie8\okok.reg
      2⤵
      • Runs .reg file with regedit
      PID:1856
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /u /s remotepg.dll
      2⤵
      • Loads dropped DLL
      PID:2044
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /u /s wuaueng.dll
      2⤵
      • Loads dropped DLL
      PID:1744
    • C:\Windows\SysWOW64\shutdown.exe
      shutdown.exe -c 祝贺您:IE8安装完毕!重启后生效. -r
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2036
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1680
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1928

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\hxkED4C.tmp

        Filesize

        172KB

        MD5

        685f1cbd4af30a1d0c25f252d399a666

        SHA1

        6a1b978f5e6150b88c8634146f1406ed97d2f134

        SHA256

        0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

        SHA512

        6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

      • \Users\Admin\AppData\Local\Temp\hxkED4C.tmp

        Filesize

        172KB

        MD5

        685f1cbd4af30a1d0c25f252d399a666

        SHA1

        6a1b978f5e6150b88c8634146f1406ed97d2f134

        SHA256

        0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

        SHA512

        6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

      • \Users\Admin\AppData\Local\Temp\hxkED4C.tmp

        Filesize

        172KB

        MD5

        685f1cbd4af30a1d0c25f252d399a666

        SHA1

        6a1b978f5e6150b88c8634146f1406ed97d2f134

        SHA256

        0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

        SHA512

        6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

      • \Users\Admin\AppData\Local\Temp\hxkED4C.tmp

        Filesize

        172KB

        MD5

        685f1cbd4af30a1d0c25f252d399a666

        SHA1

        6a1b978f5e6150b88c8634146f1406ed97d2f134

        SHA256

        0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

        SHA512

        6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

      • \Users\Admin\AppData\Local\Temp\hxkED4C.tmp

        Filesize

        172KB

        MD5

        685f1cbd4af30a1d0c25f252d399a666

        SHA1

        6a1b978f5e6150b88c8634146f1406ed97d2f134

        SHA256

        0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

        SHA512

        6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

      • memory/856-60-0x00000000002E0000-0x0000000000353000-memory.dmp

        Filesize

        460KB

      • memory/1520-72-0x0000000000400000-0x00000000004CB000-memory.dmp

        Filesize

        812KB

      • memory/1520-54-0x0000000074D61000-0x0000000074D63000-memory.dmp

        Filesize

        8KB

      • memory/1520-73-0x0000000000150000-0x00000000001C3000-memory.dmp

        Filesize

        460KB

      • memory/1680-74-0x000007FEFB801000-0x000007FEFB803000-memory.dmp

        Filesize

        8KB

      • memory/1744-70-0x00000000001E0000-0x0000000000253000-memory.dmp

        Filesize

        460KB

      • memory/2044-66-0x0000000000210000-0x0000000000283000-memory.dmp

        Filesize

        460KB