Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17/11/2022, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
TdndchBWGClEyG.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TdndchBWGClEyG.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
required documents.lnk
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
required documents.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
wabPTLAqdTmbJu.bat
Resource
win7-20221111-en
General
-
Target
required documents.lnk
-
Size
995B
-
MD5
32718d69a0919473c89e529b04a7cd38
-
SHA1
d0c4c19cf77676d2827e9b9596796583d95dce37
-
SHA256
d3c9dc14d8396686cb3c12b1a483ca30943d731f733614fda85e1039bff611c5
-
SHA512
b1119c69fb1c1205250a10ab4893072b4ed45f38f5b0af9fdfa8a6c442f738571cd09b5767345ce47414681475bd9e57fc1526185493c9c30cb8311c96e2c4ba
Malware Config
Extracted
bumblebee
15repl
23.108.57.200:443
103.144.139.158:443
23.106.160.52:443
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 1 1012 rundll32.exe 3 1012 rundll32.exe 4 1012 rundll32.exe 5 1012 rundll32.exe 6 1012 rundll32.exe 7 1012 rundll32.exe 10 1012 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1012 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1504 1748 cmd.exe 29 PID 1748 wrote to memory of 1504 1748 cmd.exe 29 PID 1748 wrote to memory of 1504 1748 cmd.exe 29 PID 1504 wrote to memory of 1012 1504 cmd.exe 30 PID 1504 wrote to memory of 1012 1504 cmd.exe 30 PID 1504 wrote to memory of 1012 1504 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\required documents.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wabPTLAqdTmbJu.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\rundll32.exerundll32 TdndchBWGClEyG.dll,appMainRun3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1012
-
-