Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe
Resource
win10v2004-20220812-en
General
-
Target
ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe
-
Size
339KB
-
MD5
23f90d47f46844993e7cf5b2d70de70f
-
SHA1
1c4c006db9a67d1702e9a91855553f5a07aa4d96
-
SHA256
ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e
-
SHA512
24d027392f63e836b4c0834f766d2db6e595643c173523b9b76aae349b75fe17aef77d243fddf2d3ce3f36d1a3672b5ec1b6ec90f4bc3c6d69fbfaedeccd1cc6
-
SSDEEP
6144:aFJ0tSrJzXKzy1qZ8LpkJXcLoSMOvpZAwAEjahOj6sVI:7ObNYjJXcE9OhPEOLVI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1504 beeieacfci.exe -
Loads dropped DLL 5 IoCs
pid Process 748 ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe 1868 WerFault.exe 1868 WerFault.exe 1868 WerFault.exe 1868 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1868 1504 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2040 wmic.exe Token: SeSecurityPrivilege 2040 wmic.exe Token: SeTakeOwnershipPrivilege 2040 wmic.exe Token: SeLoadDriverPrivilege 2040 wmic.exe Token: SeSystemProfilePrivilege 2040 wmic.exe Token: SeSystemtimePrivilege 2040 wmic.exe Token: SeProfSingleProcessPrivilege 2040 wmic.exe Token: SeIncBasePriorityPrivilege 2040 wmic.exe Token: SeCreatePagefilePrivilege 2040 wmic.exe Token: SeBackupPrivilege 2040 wmic.exe Token: SeRestorePrivilege 2040 wmic.exe Token: SeShutdownPrivilege 2040 wmic.exe Token: SeDebugPrivilege 2040 wmic.exe Token: SeSystemEnvironmentPrivilege 2040 wmic.exe Token: SeRemoteShutdownPrivilege 2040 wmic.exe Token: SeUndockPrivilege 2040 wmic.exe Token: SeManageVolumePrivilege 2040 wmic.exe Token: 33 2040 wmic.exe Token: 34 2040 wmic.exe Token: 35 2040 wmic.exe Token: SeIncreaseQuotaPrivilege 2040 wmic.exe Token: SeSecurityPrivilege 2040 wmic.exe Token: SeTakeOwnershipPrivilege 2040 wmic.exe Token: SeLoadDriverPrivilege 2040 wmic.exe Token: SeSystemProfilePrivilege 2040 wmic.exe Token: SeSystemtimePrivilege 2040 wmic.exe Token: SeProfSingleProcessPrivilege 2040 wmic.exe Token: SeIncBasePriorityPrivilege 2040 wmic.exe Token: SeCreatePagefilePrivilege 2040 wmic.exe Token: SeBackupPrivilege 2040 wmic.exe Token: SeRestorePrivilege 2040 wmic.exe Token: SeShutdownPrivilege 2040 wmic.exe Token: SeDebugPrivilege 2040 wmic.exe Token: SeSystemEnvironmentPrivilege 2040 wmic.exe Token: SeRemoteShutdownPrivilege 2040 wmic.exe Token: SeUndockPrivilege 2040 wmic.exe Token: SeManageVolumePrivilege 2040 wmic.exe Token: 33 2040 wmic.exe Token: 34 2040 wmic.exe Token: 35 2040 wmic.exe Token: SeIncreaseQuotaPrivilege 884 wmic.exe Token: SeSecurityPrivilege 884 wmic.exe Token: SeTakeOwnershipPrivilege 884 wmic.exe Token: SeLoadDriverPrivilege 884 wmic.exe Token: SeSystemProfilePrivilege 884 wmic.exe Token: SeSystemtimePrivilege 884 wmic.exe Token: SeProfSingleProcessPrivilege 884 wmic.exe Token: SeIncBasePriorityPrivilege 884 wmic.exe Token: SeCreatePagefilePrivilege 884 wmic.exe Token: SeBackupPrivilege 884 wmic.exe Token: SeRestorePrivilege 884 wmic.exe Token: SeShutdownPrivilege 884 wmic.exe Token: SeDebugPrivilege 884 wmic.exe Token: SeSystemEnvironmentPrivilege 884 wmic.exe Token: SeRemoteShutdownPrivilege 884 wmic.exe Token: SeUndockPrivilege 884 wmic.exe Token: SeManageVolumePrivilege 884 wmic.exe Token: 33 884 wmic.exe Token: 34 884 wmic.exe Token: 35 884 wmic.exe Token: SeIncreaseQuotaPrivilege 884 wmic.exe Token: SeSecurityPrivilege 884 wmic.exe Token: SeTakeOwnershipPrivilege 884 wmic.exe Token: SeLoadDriverPrivilege 884 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 748 wrote to memory of 1504 748 ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe 27 PID 748 wrote to memory of 1504 748 ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe 27 PID 748 wrote to memory of 1504 748 ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe 27 PID 748 wrote to memory of 1504 748 ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe 27 PID 1504 wrote to memory of 2040 1504 beeieacfci.exe 28 PID 1504 wrote to memory of 2040 1504 beeieacfci.exe 28 PID 1504 wrote to memory of 2040 1504 beeieacfci.exe 28 PID 1504 wrote to memory of 2040 1504 beeieacfci.exe 28 PID 1504 wrote to memory of 884 1504 beeieacfci.exe 31 PID 1504 wrote to memory of 884 1504 beeieacfci.exe 31 PID 1504 wrote to memory of 884 1504 beeieacfci.exe 31 PID 1504 wrote to memory of 884 1504 beeieacfci.exe 31 PID 1504 wrote to memory of 688 1504 beeieacfci.exe 33 PID 1504 wrote to memory of 688 1504 beeieacfci.exe 33 PID 1504 wrote to memory of 688 1504 beeieacfci.exe 33 PID 1504 wrote to memory of 688 1504 beeieacfci.exe 33 PID 1504 wrote to memory of 1048 1504 beeieacfci.exe 35 PID 1504 wrote to memory of 1048 1504 beeieacfci.exe 35 PID 1504 wrote to memory of 1048 1504 beeieacfci.exe 35 PID 1504 wrote to memory of 1048 1504 beeieacfci.exe 35 PID 1504 wrote to memory of 968 1504 beeieacfci.exe 37 PID 1504 wrote to memory of 968 1504 beeieacfci.exe 37 PID 1504 wrote to memory of 968 1504 beeieacfci.exe 37 PID 1504 wrote to memory of 968 1504 beeieacfci.exe 37 PID 1504 wrote to memory of 1868 1504 beeieacfci.exe 39 PID 1504 wrote to memory of 1868 1504 beeieacfci.exe 39 PID 1504 wrote to memory of 1868 1504 beeieacfci.exe 39 PID 1504 wrote to memory of 1868 1504 beeieacfci.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe"C:\Users\Admin\AppData\Local\Temp\ab75963b079bdd8ec13c722808e5ad1542cadd3107986eaae3b3218ac907d24e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\beeieacfci.exeC:\Users\Admin\AppData\Local\Temp\beeieacfci.exe 4)1)7)4)0)6)8)3)7)0)4 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⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81667863900.txt bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81667863900.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81667863900.txt bios get version3⤵PID:688
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81667863900.txt bios get version3⤵PID:1048
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81667863900.txt bios get version3⤵PID:968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 3723⤵
- Loads dropped DLL
- Program crash
PID:1868
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
538KB
MD5923e6c5469a7fa6b36e43dfac16f6e8a
SHA1d514ba15e26c769cf484b1d57888154aed5338e4
SHA256da3c31cff2be5e9c1778d80bad43b8e1023b4005bb7a72bc6b54ba654789d4df
SHA51248083a9c103cd9767cba4582a9401e15a3b23910c5ba4d878cda5d5382194856dfe5ff295fd3f2f668c369facf49ea85d5777d4d34bd337fc2b5c81d2a3f2783
-
Filesize
538KB
MD5923e6c5469a7fa6b36e43dfac16f6e8a
SHA1d514ba15e26c769cf484b1d57888154aed5338e4
SHA256da3c31cff2be5e9c1778d80bad43b8e1023b4005bb7a72bc6b54ba654789d4df
SHA51248083a9c103cd9767cba4582a9401e15a3b23910c5ba4d878cda5d5382194856dfe5ff295fd3f2f668c369facf49ea85d5777d4d34bd337fc2b5c81d2a3f2783
-
Filesize
538KB
MD5923e6c5469a7fa6b36e43dfac16f6e8a
SHA1d514ba15e26c769cf484b1d57888154aed5338e4
SHA256da3c31cff2be5e9c1778d80bad43b8e1023b4005bb7a72bc6b54ba654789d4df
SHA51248083a9c103cd9767cba4582a9401e15a3b23910c5ba4d878cda5d5382194856dfe5ff295fd3f2f668c369facf49ea85d5777d4d34bd337fc2b5c81d2a3f2783
-
Filesize
538KB
MD5923e6c5469a7fa6b36e43dfac16f6e8a
SHA1d514ba15e26c769cf484b1d57888154aed5338e4
SHA256da3c31cff2be5e9c1778d80bad43b8e1023b4005bb7a72bc6b54ba654789d4df
SHA51248083a9c103cd9767cba4582a9401e15a3b23910c5ba4d878cda5d5382194856dfe5ff295fd3f2f668c369facf49ea85d5777d4d34bd337fc2b5c81d2a3f2783
-
Filesize
538KB
MD5923e6c5469a7fa6b36e43dfac16f6e8a
SHA1d514ba15e26c769cf484b1d57888154aed5338e4
SHA256da3c31cff2be5e9c1778d80bad43b8e1023b4005bb7a72bc6b54ba654789d4df
SHA51248083a9c103cd9767cba4582a9401e15a3b23910c5ba4d878cda5d5382194856dfe5ff295fd3f2f668c369facf49ea85d5777d4d34bd337fc2b5c81d2a3f2783
-
Filesize
538KB
MD5923e6c5469a7fa6b36e43dfac16f6e8a
SHA1d514ba15e26c769cf484b1d57888154aed5338e4
SHA256da3c31cff2be5e9c1778d80bad43b8e1023b4005bb7a72bc6b54ba654789d4df
SHA51248083a9c103cd9767cba4582a9401e15a3b23910c5ba4d878cda5d5382194856dfe5ff295fd3f2f668c369facf49ea85d5777d4d34bd337fc2b5c81d2a3f2783