Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 08:44

General

  • Target

    4056f6d7a7904f9ec9820fc9cf35f25d33853e37751c6d0b6686d83512859122.exe

  • Size

    249KB

  • MD5

    04793993f57c714608ff9aa52816ce70

  • SHA1

    6bac96a433f04406e3aa37c9a3b046152ff627df

  • SHA256

    4056f6d7a7904f9ec9820fc9cf35f25d33853e37751c6d0b6686d83512859122

  • SHA512

    f5c08c505020692376ae731e993aa05e760eff025029ff9e984dbc83b836c2735ac2284d1c02d0413d4360205a4e1d3784f7b83cd4ed59b087ccb39dc18dafd3

  • SSDEEP

    6144:JZ+11RbrRy/1RWBT5vNbxHoZ1lNwZm/G/HcSsj:GnRs1s15zilNp/G/8

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\4056f6d7a7904f9ec9820fc9cf35f25d33853e37751c6d0b6686d83512859122.exe
        "C:\Users\Admin\AppData\Local\Temp\4056f6d7a7904f9ec9820fc9cf35f25d33853e37751c6d0b6686d83512859122.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Users\Admin\AppData\Local\Temp\4056f6d7a7904f9ec9820fc9cf35f25d33853e37751c6d0b6686d83512859122.exe
          "C:\Users\Admin\AppData\Local\Temp\4056f6d7a7904f9ec9820fc9cf35f25d33853e37751c6d0b6686d83512859122.exe"
          3⤵
            PID:748

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/536-54-0x0000000075B11000-0x0000000075B13000-memory.dmp

        Filesize

        8KB

      • memory/536-59-0x0000000000400000-0x00000000005C9000-memory.dmp

        Filesize

        1.8MB

      • memory/536-60-0x0000000000B80000-0x0000000000D49000-memory.dmp

        Filesize

        1.8MB

      • memory/536-61-0x0000000000B80000-0x0000000000D49000-memory.dmp

        Filesize

        1.8MB

      • memory/536-62-0x0000000002280000-0x0000000002449000-memory.dmp

        Filesize

        1.8MB

      • memory/536-66-0x0000000000400000-0x00000000005C9000-memory.dmp

        Filesize

        1.8MB

      • memory/536-67-0x0000000000B80000-0x0000000000D49000-memory.dmp

        Filesize

        1.8MB

      • memory/748-63-0x0000000000400000-0x00000000005C9000-memory.dmp

        Filesize

        1.8MB

      • memory/748-64-0x0000000000A40000-0x0000000000C09000-memory.dmp

        Filesize

        1.8MB

      • memory/748-65-0x0000000000A40000-0x0000000000C09000-memory.dmp

        Filesize

        1.8MB

      • memory/1276-57-0x0000000002990000-0x0000000002991000-memory.dmp

        Filesize

        4KB