Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15/11/2022, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe
Resource
win7-20220812-en
General
-
Target
2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe
-
Size
362KB
-
MD5
f1f48360f95e1b43e9fba0fec5a2afb8
-
SHA1
70ceb467db7b0161d22e4545479f747417b9705a
-
SHA256
2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49
-
SHA512
88d945c7a064882681670d9402fb8d07cd0653f5d6e7801d95b0a4a840be2a362ccb11baa6911b47538681705a76d633d8fad374a6f541dd3ed651f3b63ae3b8
-
SSDEEP
6144:iz+92mhAMJ/cPl3iis3CLBQU/FoX+R76Hyca7P8w/nD3BOrPOaYjRtGTxR3Zar:iK2mhAMJ/cPlEO7c8zcyLxODStGtR3ZC
Malware Config
Signatures
-
Detects PlugX payload 6 IoCs
resource yara_rule behavioral1/memory/1676-76-0x0000000000280000-0x00000000002B1000-memory.dmp family_plugx behavioral1/memory/1284-78-0x0000000000310000-0x0000000000341000-memory.dmp family_plugx behavioral1/memory/1928-79-0x00000000001F0000-0x0000000000221000-memory.dmp family_plugx behavioral1/memory/1248-85-0x0000000000240000-0x0000000000271000-memory.dmp family_plugx behavioral1/memory/1928-86-0x00000000001F0000-0x0000000000221000-memory.dmp family_plugx behavioral1/memory/1248-87-0x0000000000240000-0x0000000000271000-memory.dmp family_plugx -
Executes dropped EXE 2 IoCs
pid Process 1284 mcvsmap.exe 1676 mcvsmap.exe -
Deletes itself 1 IoCs
pid Process 1928 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 1284 mcvsmap.exe 1676 mcvsmap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 31003500320044003400420045003300460031004600410033004100320043000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1928 svchost.exe 1928 svchost.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe 1248 msiexec.exe 1248 msiexec.exe 1928 svchost.exe 1248 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1284 mcvsmap.exe Token: SeTcbPrivilege 1284 mcvsmap.exe Token: SeDebugPrivilege 1676 mcvsmap.exe Token: SeTcbPrivilege 1676 mcvsmap.exe Token: SeDebugPrivilege 1928 svchost.exe Token: SeTcbPrivilege 1928 svchost.exe Token: SeDebugPrivilege 1248 msiexec.exe Token: SeTcbPrivilege 1248 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1284 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 26 PID 1348 wrote to memory of 1284 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 26 PID 1348 wrote to memory of 1284 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 26 PID 1348 wrote to memory of 1284 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 26 PID 1348 wrote to memory of 1284 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 26 PID 1348 wrote to memory of 1284 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 26 PID 1348 wrote to memory of 1284 1348 2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe 26 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1676 wrote to memory of 1928 1676 mcvsmap.exe 28 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29 PID 1928 wrote to memory of 1248 1928 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe"C:\Users\Admin\AppData\Local\Temp\2bc5ce39dd9afe2157448d3f6d8cb9c549ed39543d159616e38480b9e6c11c49.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcvsmap.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcvsmap.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
C:\ProgramData\VirusMap\mcvsmap.exeC:\ProgramData\VirusMap\mcvsmap.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Deletes itself
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 19283⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD5412847d24d8194b1eb266ea59313d28b
SHA13d2b69dc7b6984d94b351f7545a2069de2174a3e
SHA256b94a6c0ccf387416c3621747b29a15ad0dfabdf5537648b91136c6d7877e9047
SHA51201666a04e3210ee346d4ca1b0acd1932b2f00776221a28abb5d4b58d8d0ff264ad5c68708210d8c3e9b4f0e4a924dd3d6399df374031748118c2936351431083
-
Filesize
618B
MD521bbac54a8af25d7f9d2fd100bcb0d23
SHA1ab2b21495844a18fa70733c8b29d54dfa662eefd
SHA256e253d5338acb593a6fc443125713da6a22e2426233e66f5cc8123fa87c1fc292
SHA51218aa832ebdd07d3262e8a9f57e89fd1ffd0a7cef8e92b598a42d6317dc82c2d00c410b1d87634a53df27eebc2ea87e584f0d12a5d3428b46fa64d1b51cd6aa0e
-
Filesize
48KB
MD5ad4a646b38a482cc07d5b09b4fffd3b3
SHA1ae0f9bf2740d00c5d485827eb32aca33feaa3a90
SHA2560a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48
SHA5120a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1
-
Filesize
121KB
MD5545bb4365a9b7cdb6d22844ebeedda93
SHA1a267f1183b4ff843d68a63264846abf78cc71d1f
SHA256d4fe890a08d4dd44b58a3b85b2a7e89536338099c1c42a9b7e85f4007b0a37b7
SHA512b9c066f0166e8acbad1e822df8af6d69c7e23da33ff8b8bde9986222193e2be3d269866ec02a784e61d9cd160a8c5c299e04f9ab0981222521d4bb38f29b8e16
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
48KB
MD5ad4a646b38a482cc07d5b09b4fffd3b3
SHA1ae0f9bf2740d00c5d485827eb32aca33feaa3a90
SHA2560a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48
SHA5120a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1
-
Filesize
121KB
MD5545bb4365a9b7cdb6d22844ebeedda93
SHA1a267f1183b4ff843d68a63264846abf78cc71d1f
SHA256d4fe890a08d4dd44b58a3b85b2a7e89536338099c1c42a9b7e85f4007b0a37b7
SHA512b9c066f0166e8acbad1e822df8af6d69c7e23da33ff8b8bde9986222193e2be3d269866ec02a784e61d9cd160a8c5c299e04f9ab0981222521d4bb38f29b8e16
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
48KB
MD5ad4a646b38a482cc07d5b09b4fffd3b3
SHA1ae0f9bf2740d00c5d485827eb32aca33feaa3a90
SHA2560a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48
SHA5120a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1
-
Filesize
48KB
MD5ad4a646b38a482cc07d5b09b4fffd3b3
SHA1ae0f9bf2740d00c5d485827eb32aca33feaa3a90
SHA2560a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48
SHA5120a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d