Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 14:26

General

  • Target

    41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe

  • Size

    141KB

  • MD5

    316f41c12c008e77f862e23ca24d1030

  • SHA1

    8ce9ed7369c573ca7af4c51ed112997506f970a5

  • SHA256

    41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0

  • SHA512

    4d6a9ad38150d9f1acf2897177342a8b8aee689dead3601d95da3cd74b8ee77a0957f4e169a489a3cdb10202e108785af2186ecf0728f64dbaf370578cb24013

  • SSDEEP

    3072:i7k1qIDapTbpSY4ESneJOLL2jO6Sd4tvERUJOsqzmFw/jkhA2j:MIuxbJ4202jlSd4yRUV+mFekF

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe
    "C:\Users\Admin\AppData\Local\Temp\41af735d41cce4d92f6603ee540baa44b2c87e8a7e3a1a04c9da58c4cb5211f0.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=vsd3g0h_vs0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c7ead8a44bb1beee48da32f9ce6ad31

    SHA1

    ac1a452d23750ce1303f82fa88f81b26b88fe07b

    SHA256

    7f189a673898574a3874fa5e07ab415d5302284224b03d39b3a8408e675ffed8

    SHA512

    165f63e02285043e83e510743f9918a0f2b49df77eb94e93c615ad8143d4bfb570cdc50ab5dfefdcb8aa98ad79a0d24f14d9b5298b9d79037cd1c35ab8ba2cab

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    1KB

    MD5

    af54a4efc91f7a1b703bf11c56bde66a

    SHA1

    0b971fbf637c2248e4c13e1cad2d89eaa0621ddd

    SHA256

    88b995d133412ce943192402882f862b14017d3dfc572cdb2712419a8175180e

    SHA512

    56bc209a276dbbe9be3df77038bd346af1042bca0de3e8d587930753a9ed802378d4096623d48d199876a39297bfbede656ec7506f4d69700e6b864d449f5f8f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZTN3VZZC.txt

    Filesize

    599B

    MD5

    f5592f858b37b75e06dfb97d2f2e24f3

    SHA1

    217b9fca8b7052408a0d027a04c23bb2ebe6a0d7

    SHA256

    c745985dd14c95f830f9bd3d1ea6c617b1b8c76005025c5b2b0845bd131b9225

    SHA512

    273c083f3664f63fed17c6d28167e003499147695db4f046648ecb2ce3a442f04bd084e9d0674ba8f668c9383b9f05b260a6c366ee051f40a6993dbfecd481e9

  • memory/1692-54-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/1692-55-0x0000000000270000-0x00000000002B6000-memory.dmp

    Filesize

    280KB

  • memory/1692-58-0x0000000000270000-0x00000000002B6000-memory.dmp

    Filesize

    280KB

  • memory/1692-59-0x0000000076651000-0x0000000076653000-memory.dmp

    Filesize

    8KB

  • memory/1692-61-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB