Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 18:21

General

  • Target

    6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe

  • Size

    188KB

  • MD5

    091b857bf7f5ca1c875a68ace871e8c3

  • SHA1

    25e4af8be0e3517371fcfb73e25c78a2c6556287

  • SHA256

    6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89

  • SHA512

    7c8661a36b702cc6f83ee98d3b4bd8043d8d323798d7671d6da37976b879fa5dd8f520452f6b1892791e54776a8e6880cef2904483f7f8d55d5269ff8ff42123

  • SSDEEP

    3072:obpDCw1p3vmLvsZIaVwiwDcIbDHDCm/DER4eQ9nQ1wJ:gDCwfG1bnxLERRa

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe
    "C:\Users\Admin\AppData\Local\Temp\6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Windows\SysWOW64\REG.exe
      REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
      2⤵
      • Modifies registry key
      PID:1072
    • C:\Users\Admin\AppData\Local\Temp\avscan.exe
      C:\Users\Admin\AppData\Local\Temp\avscan.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Users\Admin\AppData\Local\Temp\avscan.exe
        C:\Users\Admin\AppData\Local\Temp\avscan.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1992
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\windows\W_X_C.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\windows\hosts.exe
          C:\windows\hosts.exe
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:280
          • C:\Users\Admin\AppData\Local\Temp\avscan.exe
            C:\Users\Admin\AppData\Local\Temp\avscan.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:876
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c c:\windows\W_X_C.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:804
            • C:\windows\hosts.exe
              C:\windows\hosts.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1972
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
              6⤵
              • Adds policy Run key to start application
              PID:560
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:1624
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:936
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:656
          • C:\Windows\SysWOW64\REG.exe
            REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
            5⤵
            • Modifies registry key
            PID:1232
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
          4⤵
          • Adds policy Run key to start application
          PID:1180
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1064
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1396
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1924
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1968
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\windows\W_X_C.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\windows\hosts.exe
        C:\windows\hosts.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1816
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
        3⤵
        • Adds policy Run key to start application
        PID:1696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    236KB

    MD5

    a39b37d9c298823e155ecc042277bc16

    SHA1

    3a42460d617735a66212f5f502586e4aea234e5f

    SHA256

    10ce96ed3237b29c84fc4b37520c226847c00ebb4ad5cd966374c0c4c8336a9b

    SHA512

    d28a28c5945b57649fd77f8a7f3ee06ac03caf3b6583b3bf23a8a136d2ffe51f7cff3072b0af05d427fb5a197c10d457a11ee657f20e2faccf562809b506bb1d

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    612KB

    MD5

    7738cc227c179607d2b455e602240eac

    SHA1

    9f8175814b84ef77bce55f32ed163bccca6db412

    SHA256

    4cc5ababba70385fbdb27d5d7f3bf7955e0bbc910ff448e87cec7869d87df177

    SHA512

    86427720d70f2d3922f1ef36dec6a35504a16fbd0c8a215eabb8c93180e3e9a5f028ce5c038c86db21f8ad45beea9fca5945f77c27fba711a66a54bca6b22c46

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    988KB

    MD5

    f48622b92bfba66767c232dc4e0e38b0

    SHA1

    7fed88a3d46d8ce0c9692fc0a978968f9c9dd0ab

    SHA256

    783f2d6b9ef4a7c6b19120b5232b0d6046de51201938c799c590e57c1e47a776

    SHA512

    059dd87c5ea8071f46cce2d262f403f1900d498f62fd44f24911a9b9042c11466d6545e5141d747de13e20b12c3f4e728c6f20c7c715b2cf921d4b4fb05efcf4

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    1.3MB

    MD5

    a048d1c55d139acff8bae39168b10a27

    SHA1

    95ce61aecdb9db4ad4e6bf77fa1814edbeb58023

    SHA256

    e45a7cd8c0056d0f514e8645c05c7ac3bd529eeccb074338e8a324bed471d297

    SHA512

    1caae3edf7a55652b2e8b4f37e3e33fe651a3d229c92cea45214bc809f89d863d5cb7714a2c2db15dd0547ecb78e93172011e5c8a7413ea726298115345da4d6

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • C:\Windows\W_X_C.vbs

    Filesize

    195B

    MD5

    b147c267b47c4a6cfa3a72c41407541b

    SHA1

    062231bf7639b26f92e6d5ef78d515f8eaa9639d

    SHA256

    c9b7b5b912ab24c729de962727ac33835dd58f17754f9368ac702b9987f3baf6

    SHA512

    4f646fee7eaa29f33604b3f349b3d90a65bec39fdbe80bac6dcd2cd67b17475e51f833a66a5207d3008fede867792605bab132d6672e206bfefaa83aa344ac64

  • C:\Windows\hosts.exe

    Filesize

    188KB

    MD5

    45bbffa5cfae2e667de565f3d3f704d9

    SHA1

    56f0da1f960795273a3df90d4efd0849e7708e4e

    SHA256

    f2bfcfe42c7c49c33bf0bd23af0f1d32b4740683b65003ca4f9b4d7fc0427088

    SHA512

    f68ff64b8c9bf1bc376adbabe75acc93f7ec76ccc5c2d8e68b284a4322b688c3ce59d5b3c4f5330b6cc32d4a9a2ffcf043a0c41373ac02c039651b6c47cb9161

  • C:\Windows\hosts.exe

    Filesize

    188KB

    MD5

    45bbffa5cfae2e667de565f3d3f704d9

    SHA1

    56f0da1f960795273a3df90d4efd0849e7708e4e

    SHA256

    f2bfcfe42c7c49c33bf0bd23af0f1d32b4740683b65003ca4f9b4d7fc0427088

    SHA512

    f68ff64b8c9bf1bc376adbabe75acc93f7ec76ccc5c2d8e68b284a4322b688c3ce59d5b3c4f5330b6cc32d4a9a2ffcf043a0c41373ac02c039651b6c47cb9161

  • C:\Windows\hosts.exe

    Filesize

    188KB

    MD5

    45bbffa5cfae2e667de565f3d3f704d9

    SHA1

    56f0da1f960795273a3df90d4efd0849e7708e4e

    SHA256

    f2bfcfe42c7c49c33bf0bd23af0f1d32b4740683b65003ca4f9b4d7fc0427088

    SHA512

    f68ff64b8c9bf1bc376adbabe75acc93f7ec76ccc5c2d8e68b284a4322b688c3ce59d5b3c4f5330b6cc32d4a9a2ffcf043a0c41373ac02c039651b6c47cb9161

  • C:\Windows\hosts.exe

    Filesize

    188KB

    MD5

    45bbffa5cfae2e667de565f3d3f704d9

    SHA1

    56f0da1f960795273a3df90d4efd0849e7708e4e

    SHA256

    f2bfcfe42c7c49c33bf0bd23af0f1d32b4740683b65003ca4f9b4d7fc0427088

    SHA512

    f68ff64b8c9bf1bc376adbabe75acc93f7ec76ccc5c2d8e68b284a4322b688c3ce59d5b3c4f5330b6cc32d4a9a2ffcf043a0c41373ac02c039651b6c47cb9161

  • C:\windows\hosts.exe

    Filesize

    188KB

    MD5

    45bbffa5cfae2e667de565f3d3f704d9

    SHA1

    56f0da1f960795273a3df90d4efd0849e7708e4e

    SHA256

    f2bfcfe42c7c49c33bf0bd23af0f1d32b4740683b65003ca4f9b4d7fc0427088

    SHA512

    f68ff64b8c9bf1bc376adbabe75acc93f7ec76ccc5c2d8e68b284a4322b688c3ce59d5b3c4f5330b6cc32d4a9a2ffcf043a0c41373ac02c039651b6c47cb9161

  • \??\c:\windows\W_X_C.bat

    Filesize

    336B

    MD5

    4db9f8b6175722b62ececeeeba1ce307

    SHA1

    3b3ba8414706e72a6fa19e884a97b87609e11e47

    SHA256

    d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78

    SHA512

    1d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    188KB

    MD5

    55043343239f740a75e4a7df0c126513

    SHA1

    d8eee134e44c86bcc5df3fd4c27fe51458cedb78

    SHA256

    37722e3e1a32cf5d793714a859b293e0508f187299b9d88da649fb035090788a

    SHA512

    2e340e7e0cda8d21c4765ee2bac8225b4dc3fc0f1c60fa0e84066502febbf33d75af80aa4e095716af51bf873d9bcf8989b76fc6da6a38580af1cb2c34e870aa

  • memory/856-56-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB

  • memory/856-58-0x0000000074B51000-0x0000000074B53000-memory.dmp

    Filesize

    8KB