Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
163KB
-
MD5
4bdfc297faf9f3d94476f8fe02b68de6
-
SHA1
e23a6b2de6c5a897d2ed2d2ada9931086231b255
-
SHA256
c0e391cc147b45c007a23d34db1f5d92804f4a7c6e25a197c17c22e0baa4290c
-
SHA512
570712ef635f316d90f13a60bc2cac618a2b361fab389457d49472ace3dfc0257360a066e648cf8b635934b5c652ea4f944be9b7168a9f632d84b2138285a722
-
SSDEEP
3072:UC4O5okyivqKR1TI3UN/vkhwYMBD0+DfYqA4SFwP79qVla5AEOjd07QlS:UhvJKR1UFuBFLYqhSFc901dBlS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1744 drv73825.exe 2032 drv73825.exe -
Loads dropped DLL 2 IoCs
pid Process 1472 Trojan-Ransom.Win32.Blocker.exe 1472 Trojan-Ransom.Win32.Blocker.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Trojan-Ransom.Win32.Blocker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{12416-2365-1385-346865} = "C:\\Users\\Admin\\AppData\\Roaming\\drv73825.exe" Trojan-Ransom.Win32.Blocker.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1112 set thread context of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1744 set thread context of 2032 1744 drv73825.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1112 wrote to memory of 1472 1112 Trojan-Ransom.Win32.Blocker.exe 28 PID 1472 wrote to memory of 1744 1472 Trojan-Ransom.Win32.Blocker.exe 29 PID 1472 wrote to memory of 1744 1472 Trojan-Ransom.Win32.Blocker.exe 29 PID 1472 wrote to memory of 1744 1472 Trojan-Ransom.Win32.Blocker.exe 29 PID 1472 wrote to memory of 1744 1472 Trojan-Ransom.Win32.Blocker.exe 29 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 1744 wrote to memory of 2032 1744 drv73825.exe 30 PID 2032 wrote to memory of 320 2032 drv73825.exe 31 PID 2032 wrote to memory of 320 2032 drv73825.exe 31 PID 2032 wrote to memory of 320 2032 drv73825.exe 31 PID 2032 wrote to memory of 320 2032 drv73825.exe 31 PID 2032 wrote to memory of 320 2032 drv73825.exe 31 PID 2032 wrote to memory of 320 2032 drv73825.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Roaming\drv73825.exe"C:\Users\Admin\AppData\Roaming\drv73825.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\drv73825.exe"C:\Users\Admin\AppData\Roaming\drv73825.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\WINDOWS\SysWOW64\explorer.exeC:\WINDOWS\SysWOW64\explorer.exe5⤵PID:320
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD54bdfc297faf9f3d94476f8fe02b68de6
SHA1e23a6b2de6c5a897d2ed2d2ada9931086231b255
SHA256c0e391cc147b45c007a23d34db1f5d92804f4a7c6e25a197c17c22e0baa4290c
SHA512570712ef635f316d90f13a60bc2cac618a2b361fab389457d49472ace3dfc0257360a066e648cf8b635934b5c652ea4f944be9b7168a9f632d84b2138285a722
-
Filesize
163KB
MD54bdfc297faf9f3d94476f8fe02b68de6
SHA1e23a6b2de6c5a897d2ed2d2ada9931086231b255
SHA256c0e391cc147b45c007a23d34db1f5d92804f4a7c6e25a197c17c22e0baa4290c
SHA512570712ef635f316d90f13a60bc2cac618a2b361fab389457d49472ace3dfc0257360a066e648cf8b635934b5c652ea4f944be9b7168a9f632d84b2138285a722
-
Filesize
163KB
MD54bdfc297faf9f3d94476f8fe02b68de6
SHA1e23a6b2de6c5a897d2ed2d2ada9931086231b255
SHA256c0e391cc147b45c007a23d34db1f5d92804f4a7c6e25a197c17c22e0baa4290c
SHA512570712ef635f316d90f13a60bc2cac618a2b361fab389457d49472ace3dfc0257360a066e648cf8b635934b5c652ea4f944be9b7168a9f632d84b2138285a722
-
Filesize
163KB
MD54bdfc297faf9f3d94476f8fe02b68de6
SHA1e23a6b2de6c5a897d2ed2d2ada9931086231b255
SHA256c0e391cc147b45c007a23d34db1f5d92804f4a7c6e25a197c17c22e0baa4290c
SHA512570712ef635f316d90f13a60bc2cac618a2b361fab389457d49472ace3dfc0257360a066e648cf8b635934b5c652ea4f944be9b7168a9f632d84b2138285a722
-
Filesize
163KB
MD54bdfc297faf9f3d94476f8fe02b68de6
SHA1e23a6b2de6c5a897d2ed2d2ada9931086231b255
SHA256c0e391cc147b45c007a23d34db1f5d92804f4a7c6e25a197c17c22e0baa4290c
SHA512570712ef635f316d90f13a60bc2cac618a2b361fab389457d49472ace3dfc0257360a066e648cf8b635934b5c652ea4f944be9b7168a9f632d84b2138285a722