Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe
Resource
win10v2004-20220901-en
General
-
Target
9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe
-
Size
37KB
-
MD5
0b772f14c89af094928a4a83231f06b0
-
SHA1
9b340392ad4a0b2c5e20215d2a5319dcbadb0032
-
SHA256
9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789
-
SHA512
c9db6f92610c5ae7615d9cc95c0d8ca14df77095d45f89b72be7ea0bf32b63fa01a8e0302cbf5c0769fd81e7044fbd6f93f61021c866dcceca93a442de26909c
-
SSDEEP
768:Eyf4uDKrBMOTh6wbaqn7GqEl97wagRMOZ:xAumrBTh6wbObl901R
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 868 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 676 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 676 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1280 9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1280 wrote to memory of 868 1280 9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe 28 PID 1280 wrote to memory of 868 1280 9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe 28 PID 1280 wrote to memory of 868 1280 9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe 28 PID 1280 wrote to memory of 868 1280 9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe 28 PID 868 wrote to memory of 676 868 cmd.exe 30 PID 868 wrote to memory of 676 868 cmd.exe 30 PID 868 wrote to memory of 676 868 cmd.exe 30 PID 868 wrote to memory of 676 868 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe"C:\Users\Admin\AppData\Local\Temp\9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 9575e418eb569554ea906622fc782a050ce94fc465798faf4cea51a6ab97b789.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-