Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 20:56

General

  • Target

    2cc601515f340fc32b557a2f009e5ad47ff9bc4e4436060c9f6b0a75b0543b2b.exe

  • Size

    140KB

  • MD5

    43d864e644fceba34c844320f72e446e

  • SHA1

    48e69f0441fca99a81c380253b3a55a5d14d3cad

  • SHA256

    2cc601515f340fc32b557a2f009e5ad47ff9bc4e4436060c9f6b0a75b0543b2b

  • SHA512

    3d7e069451232de9658b217a26a1ee28d456555852e861106b432660a522f39a8e4d0c5abbd1e68869f5dfe215ebedf7183a2651ac1cec7777427061b1518da1

  • SSDEEP

    768:zCzMyyt4pd04q0zik+vhy7g0EM/LinbQO55yU:WveEn3+pCg0EUGQO+U

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cc601515f340fc32b557a2f009e5ad47ff9bc4e4436060c9f6b0a75b0543b2b.exe
    "C:\Users\Admin\AppData\Local\Temp\2cc601515f340fc32b557a2f009e5ad47ff9bc4e4436060c9f6b0a75b0543b2b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\hecex.exe
      "C:\Users\Admin\hecex.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hecex.exe

    Filesize

    140KB

    MD5

    6fde45d4446efc503ae79336d3802bc0

    SHA1

    1b814f9e3eaea57ce62d03ee3bb20e2cfe412ecf

    SHA256

    53c46aa88a810262533f6de1bb0f88f9f4bc3b8461affb7c5af0d116ee857f3e

    SHA512

    0032cf432a14a891a8afd9fd364813a4ec1e1232cd5ac848f36cb5109bf8c5f700f52aae6390d0efd7f6e80381ed6e1af6b40d1a46281bf601190f0bafc07f6f

  • C:\Users\Admin\hecex.exe

    Filesize

    140KB

    MD5

    6fde45d4446efc503ae79336d3802bc0

    SHA1

    1b814f9e3eaea57ce62d03ee3bb20e2cfe412ecf

    SHA256

    53c46aa88a810262533f6de1bb0f88f9f4bc3b8461affb7c5af0d116ee857f3e

    SHA512

    0032cf432a14a891a8afd9fd364813a4ec1e1232cd5ac848f36cb5109bf8c5f700f52aae6390d0efd7f6e80381ed6e1af6b40d1a46281bf601190f0bafc07f6f

  • \Users\Admin\hecex.exe

    Filesize

    140KB

    MD5

    6fde45d4446efc503ae79336d3802bc0

    SHA1

    1b814f9e3eaea57ce62d03ee3bb20e2cfe412ecf

    SHA256

    53c46aa88a810262533f6de1bb0f88f9f4bc3b8461affb7c5af0d116ee857f3e

    SHA512

    0032cf432a14a891a8afd9fd364813a4ec1e1232cd5ac848f36cb5109bf8c5f700f52aae6390d0efd7f6e80381ed6e1af6b40d1a46281bf601190f0bafc07f6f

  • \Users\Admin\hecex.exe

    Filesize

    140KB

    MD5

    6fde45d4446efc503ae79336d3802bc0

    SHA1

    1b814f9e3eaea57ce62d03ee3bb20e2cfe412ecf

    SHA256

    53c46aa88a810262533f6de1bb0f88f9f4bc3b8461affb7c5af0d116ee857f3e

    SHA512

    0032cf432a14a891a8afd9fd364813a4ec1e1232cd5ac848f36cb5109bf8c5f700f52aae6390d0efd7f6e80381ed6e1af6b40d1a46281bf601190f0bafc07f6f

  • memory/1760-56-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

    Filesize

    8KB