Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 19:58 UTC

General

  • Target

    86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.exe

  • Size

    1.9MB

  • MD5

    8f30485f329f2d5387b52d28ef83eb85

  • SHA1

    875b5478a22f62c463c7fad193902b6d485d0693

  • SHA256

    86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a

  • SHA512

    5ae5cfd592cab63328dee0d81e73ce7161038f2c761bd878b18c10acd02961081c5c3aba1a1a3fdc80ef56fae8bb0796465b845e3bce6653f6af8a0aa0a08597

  • SSDEEP

    49152:w2UqjzW9ChL5S+TOR4tSwEat9rfkhPZqbb:wDlCh59OWtSG9rfxbb

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.exe
    "C:\Users\Admin\AppData\Local\Temp\86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\is-QH32L.tmp\86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QH32L.tmp\86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.tmp" /SL5="$70124,1645600,51712,C:\Users\Admin\AppData\Local\Temp\86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-QH32L.tmp\86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.tmp

    Filesize

    693KB

    MD5

    82e31dc1c0fa036f7dfaff76c13003cf

    SHA1

    2642671a2faf72af7d64e953b49e62f538d53824

    SHA256

    db6aa814463fa84a36bd66efacfaa1b91f92ba658b7145fabf5f6ee018e4c634

    SHA512

    86f09d6387fedf6cfec7edd1e93ad89898377e314baaf75dc090194c3af17339a592ba5342c5240be4f9a12bbc40f621062226660b32047843564037155b3641

  • C:\Users\Admin\AppData\Local\Temp\is-QH32L.tmp\86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.tmp

    Filesize

    693KB

    MD5

    82e31dc1c0fa036f7dfaff76c13003cf

    SHA1

    2642671a2faf72af7d64e953b49e62f538d53824

    SHA256

    db6aa814463fa84a36bd66efacfaa1b91f92ba658b7145fabf5f6ee018e4c634

    SHA512

    86f09d6387fedf6cfec7edd1e93ad89898377e314baaf75dc090194c3af17339a592ba5342c5240be4f9a12bbc40f621062226660b32047843564037155b3641

  • \Users\Admin\AppData\Local\Temp\is-QH32L.tmp\86274615430f6698d27b64423dc7082644cf18d09972312eee5c9399bb8cbb7a.tmp

    Filesize

    693KB

    MD5

    82e31dc1c0fa036f7dfaff76c13003cf

    SHA1

    2642671a2faf72af7d64e953b49e62f538d53824

    SHA256

    db6aa814463fa84a36bd66efacfaa1b91f92ba658b7145fabf5f6ee018e4c634

    SHA512

    86f09d6387fedf6cfec7edd1e93ad89898377e314baaf75dc090194c3af17339a592ba5342c5240be4f9a12bbc40f621062226660b32047843564037155b3641

  • \Users\Admin\AppData\Local\Temp\is-U8MRL.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-U8MRL.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1460-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

    Filesize

    8KB

  • memory/1460-55-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1460-64-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.