Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 00:33
Behavioral task
behavioral1
Sample
baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe
Resource
win10v2004-20220812-en
General
-
Target
baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe
-
Size
20KB
-
MD5
6eef2913e9aefba94cf1ec1ca5520d8e
-
SHA1
6805be988c192a166a6aa94ef5c80983c9c233ac
-
SHA256
baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39
-
SHA512
0191a8fad7c9d84add6e8e677d012346afc5ba3a3e49ebfa5b96ea0edea96c07b1b71f4e8c6c7faf88108ccec354ed507568013077de0a9308a6a633467b3921
-
SSDEEP
384:zHz6AWjDlSWUYjI0KqJC7aUiZH2z+jcbk4WhrhUaAjjJZM:Hbc1jI0KqJdUiZH2QKk4mVUag
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 vcflye.exe -
resource yara_rule behavioral1/memory/1008-55-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-60.dat upx behavioral1/memory/1704-62-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1704-63-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 844 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 vcflye.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: vcflye.exe File opened (read-only) \??\F: vcflye.exe File opened (read-only) \??\G: vcflye.exe File opened (read-only) \??\O: vcflye.exe File opened (read-only) \??\T: vcflye.exe File opened (read-only) \??\W: vcflye.exe File opened (read-only) \??\R: vcflye.exe File opened (read-only) \??\S: vcflye.exe File opened (read-only) \??\V: vcflye.exe File opened (read-only) \??\H: vcflye.exe File opened (read-only) \??\I: vcflye.exe File opened (read-only) \??\L: vcflye.exe File opened (read-only) \??\P: vcflye.exe File opened (read-only) \??\Q: vcflye.exe File opened (read-only) \??\J: vcflye.exe File opened (read-only) \??\M: vcflye.exe File opened (read-only) \??\U: vcflye.exe File opened (read-only) \??\Z: vcflye.exe File opened (read-only) \??\E: vcflye.exe File opened (read-only) \??\K: vcflye.exe File opened (read-only) \??\N: vcflye.exe File opened (read-only) \??\X: vcflye.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\hra33.dll vcflye.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\7-Zip\lpk.dll vcflye.exe File opened for modification C:\Program Files\7-Zip\lpk.dll vcflye.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\vcflye.exe baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe File opened for modification C:\Windows\vcflye.exe baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe Token: SeIncBasePriorityPrivilege 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1008 wrote to memory of 1784 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe 29 PID 1008 wrote to memory of 1784 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe 29 PID 1008 wrote to memory of 1784 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe 29 PID 1008 wrote to memory of 1784 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe 29 PID 1008 wrote to memory of 844 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe 31 PID 1008 wrote to memory of 844 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe 31 PID 1008 wrote to memory of 844 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe 31 PID 1008 wrote to memory of 844 1008 baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe"C:\Users\Admin\AppData\Local\Temp\baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BAF809~1.EXE > nul2⤵PID:1784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BAF809~1.EXE > nul2⤵
- Deletes itself
PID:844
-
-
C:\Windows\vcflye.exeC:\Windows\vcflye.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD56eef2913e9aefba94cf1ec1ca5520d8e
SHA16805be988c192a166a6aa94ef5c80983c9c233ac
SHA256baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39
SHA5120191a8fad7c9d84add6e8e677d012346afc5ba3a3e49ebfa5b96ea0edea96c07b1b71f4e8c6c7faf88108ccec354ed507568013077de0a9308a6a633467b3921
-
Filesize
20KB
MD56eef2913e9aefba94cf1ec1ca5520d8e
SHA16805be988c192a166a6aa94ef5c80983c9c233ac
SHA256baf809cac16d47406b54e75c6605edb309e4d17aaf3366e4d450dbd9d2d79a39
SHA5120191a8fad7c9d84add6e8e677d012346afc5ba3a3e49ebfa5b96ea0edea96c07b1b71f4e8c6c7faf88108ccec354ed507568013077de0a9308a6a633467b3921
-
Filesize
29KB
MD58653601350c2d4875eec9b4a222e7b3d
SHA1fa309c7bb25912814812e7bbcd36ed10161b36e4
SHA256c0cca2926096435b9fa60d04bfa7516194695d66ba937c79e564080ce27d48fd
SHA512f4aa8e1a82d146a0fb786796ba8feed1d77bc4135108740c29fcf9a532156a8f95a2e46e1f0892f3610a5ef31677a14adad85cfdacbeaeb1b2d5355652c77c95