Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    202s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 00:29 UTC

General

  • Target

    751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe

  • Size

    60KB

  • MD5

    360d89d5aa19c242f346d939962cb590

  • SHA1

    b5cd4284f8edbd39c88b7e587181cab6a0924261

  • SHA256

    751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c

  • SHA512

    f7ad21fa811aa1471e17b6b90040556983b729373796e5a3879580e3facc074a23ed05f06ba1badd7e8e7c2f9cb346a7c415ca9d9095fb07849faef977a09e74

  • SSDEEP

    768:k6qTD9xRIHgWTU6xUdPMXndo7sZUNMRrY20KtF1eNbw1o+pdok4I:h2DL6mJdsndo6UNMyetF1qw1o+pdSI

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
    "C:\Users\Admin\AppData\Local\Temp\751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Users\Admin\gaove.exe
      "C:\Users\Admin\gaove.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:532

Network

  • flag-unknown
    DNS
    ns1.player1253.com
    751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
    Remote address:
    8.8.8.8:53
    Request
    ns1.player1253.com
    IN A
    Response
    ns1.player1253.com
    IN A
    204.11.56.48
  • 204.11.56.48:8000
    ns1.player1253.com
    751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
    152 B
    3
  • 8.8.8.8:53
    ns1.player1253.com
    dns
    751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
    64 B
    80 B
    1
    1

    DNS Request

    ns1.player1253.com

    DNS Response

    204.11.56.48

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gaove.exe

    Filesize

    60KB

    MD5

    08b3e72703cc5b8ecdc06580191805de

    SHA1

    b7c51aeefb5e23786374795cd8314dfd69f93204

    SHA256

    b68b3a912c42d192e176e021817a60e119650ce133383886a063d14cf3cc9208

    SHA512

    6cdfc0bff15c6ec4a3e0475058046f7ccfe8a141070d441423544f2b0d99ad31932bc61e94f9c3517bebf027305c3af501fedbbe28bea75771ca6322032d8d7c

  • C:\Users\Admin\gaove.exe

    Filesize

    60KB

    MD5

    08b3e72703cc5b8ecdc06580191805de

    SHA1

    b7c51aeefb5e23786374795cd8314dfd69f93204

    SHA256

    b68b3a912c42d192e176e021817a60e119650ce133383886a063d14cf3cc9208

    SHA512

    6cdfc0bff15c6ec4a3e0475058046f7ccfe8a141070d441423544f2b0d99ad31932bc61e94f9c3517bebf027305c3af501fedbbe28bea75771ca6322032d8d7c

  • \Users\Admin\gaove.exe

    Filesize

    60KB

    MD5

    08b3e72703cc5b8ecdc06580191805de

    SHA1

    b7c51aeefb5e23786374795cd8314dfd69f93204

    SHA256

    b68b3a912c42d192e176e021817a60e119650ce133383886a063d14cf3cc9208

    SHA512

    6cdfc0bff15c6ec4a3e0475058046f7ccfe8a141070d441423544f2b0d99ad31932bc61e94f9c3517bebf027305c3af501fedbbe28bea75771ca6322032d8d7c

  • \Users\Admin\gaove.exe

    Filesize

    60KB

    MD5

    08b3e72703cc5b8ecdc06580191805de

    SHA1

    b7c51aeefb5e23786374795cd8314dfd69f93204

    SHA256

    b68b3a912c42d192e176e021817a60e119650ce133383886a063d14cf3cc9208

    SHA512

    6cdfc0bff15c6ec4a3e0475058046f7ccfe8a141070d441423544f2b0d99ad31932bc61e94f9c3517bebf027305c3af501fedbbe28bea75771ca6322032d8d7c

  • memory/332-56-0x00000000767B1000-0x00000000767B3000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.