Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    230s
  • max time network
    244s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 00:14

General

  • Target

    ac1b033d8dae60ad9be76ea07ba5478ad0efdc587948ebb7338ab138d83fda66.exe

  • Size

    336KB

  • MD5

    2727f1d715f374efa26a410ce5b8ca25

  • SHA1

    8e30cefca9184bed17abd7da646a5b832a40ab56

  • SHA256

    ac1b033d8dae60ad9be76ea07ba5478ad0efdc587948ebb7338ab138d83fda66

  • SHA512

    db9cbb9a36ab0464196530f0e95023ca754d441c3b8c059fb642566ff95ba2a4309bac2658f11265072579931f2bd62cbd497ae18a4e912e0fe82e3d3b488070

  • SSDEEP

    6144:r49j2RltrcbSzj2Sh0ITTD/DDyFoW0QOWfwBHGifGnWW9:rKKRltASzj2WHTTD/DDyFoW0QOWIpSW0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac1b033d8dae60ad9be76ea07ba5478ad0efdc587948ebb7338ab138d83fda66.exe
    "C:\Users\Admin\AppData\Local\Temp\ac1b033d8dae60ad9be76ea07ba5478ad0efdc587948ebb7338ab138d83fda66.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:472
    • C:\Users\Admin\qaifo.exe
      "C:\Users\Admin\qaifo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qaifo.exe

    Filesize

    336KB

    MD5

    bfaff1a14ac01e3cce5391daed753c81

    SHA1

    1837a353e0c9bb5e3a7baeb8c2af9c817c2b5aa7

    SHA256

    ff22caf97ad1587c3309d558740164690e392fcd9b05e8a8dd88dc84a7e16680

    SHA512

    4ba775a14d62c0edf84ac1d431b1299bc1dcbc954cdd7f714ec0136ee6d2612d4d9e3ccdc228191d3fa634c0dbc88a27927279e43a2f42ec65d819b5ee13d55d

  • C:\Users\Admin\qaifo.exe

    Filesize

    336KB

    MD5

    bfaff1a14ac01e3cce5391daed753c81

    SHA1

    1837a353e0c9bb5e3a7baeb8c2af9c817c2b5aa7

    SHA256

    ff22caf97ad1587c3309d558740164690e392fcd9b05e8a8dd88dc84a7e16680

    SHA512

    4ba775a14d62c0edf84ac1d431b1299bc1dcbc954cdd7f714ec0136ee6d2612d4d9e3ccdc228191d3fa634c0dbc88a27927279e43a2f42ec65d819b5ee13d55d

  • \Users\Admin\qaifo.exe

    Filesize

    336KB

    MD5

    bfaff1a14ac01e3cce5391daed753c81

    SHA1

    1837a353e0c9bb5e3a7baeb8c2af9c817c2b5aa7

    SHA256

    ff22caf97ad1587c3309d558740164690e392fcd9b05e8a8dd88dc84a7e16680

    SHA512

    4ba775a14d62c0edf84ac1d431b1299bc1dcbc954cdd7f714ec0136ee6d2612d4d9e3ccdc228191d3fa634c0dbc88a27927279e43a2f42ec65d819b5ee13d55d

  • \Users\Admin\qaifo.exe

    Filesize

    336KB

    MD5

    bfaff1a14ac01e3cce5391daed753c81

    SHA1

    1837a353e0c9bb5e3a7baeb8c2af9c817c2b5aa7

    SHA256

    ff22caf97ad1587c3309d558740164690e392fcd9b05e8a8dd88dc84a7e16680

    SHA512

    4ba775a14d62c0edf84ac1d431b1299bc1dcbc954cdd7f714ec0136ee6d2612d4d9e3ccdc228191d3fa634c0dbc88a27927279e43a2f42ec65d819b5ee13d55d

  • memory/472-56-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

    Filesize

    8KB