Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 09:50

General

  • Target

    f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe

  • Size

    185KB

  • MD5

    87da96422cbb87d1d5dddf3020bdf113

  • SHA1

    ace3f2d581e2f0467c81701624db41097624e3e6

  • SHA256

    f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba

  • SHA512

    8bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75

  • SSDEEP

    1536:uXFdueBTNWCTQ/kZaEGLU+D7lDAj/70+ZdD7TB1LW7ecPL1k3Urrrrh:kdlBTwCT2kZaED+DJYjNZlB14BOA

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe
    "C:\Users\Admin\AppData\Local\Temp\f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe
      "C:\Users\Admin\AppData\Local\Temp\f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Program Files (x86)\Microsoft Services\symgr.exe
        "C:\Program Files (x86)\Microsoft Services\symgr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:484
        • C:\Program Files (x86)\Microsoft Services\symgr.exe
          "C:\Program Files (x86)\Microsoft Services\symgr.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Sets service image path in registry
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Users\Admin\AppData\Roaming\wd.exe
            "C:\Users\Admin\AppData\Roaming\wd.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1928
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
            dw20.exe -x -s 1036
            5⤵
            • Loads dropped DLL
            PID:988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Services\symgr.exe

    Filesize

    185KB

    MD5

    87da96422cbb87d1d5dddf3020bdf113

    SHA1

    ace3f2d581e2f0467c81701624db41097624e3e6

    SHA256

    f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba

    SHA512

    8bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75

  • C:\Program Files (x86)\Microsoft Services\symgr.exe

    Filesize

    185KB

    MD5

    87da96422cbb87d1d5dddf3020bdf113

    SHA1

    ace3f2d581e2f0467c81701624db41097624e3e6

    SHA256

    f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba

    SHA512

    8bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75

  • C:\Program Files (x86)\Microsoft Services\symgr.exe

    Filesize

    185KB

    MD5

    87da96422cbb87d1d5dddf3020bdf113

    SHA1

    ace3f2d581e2f0467c81701624db41097624e3e6

    SHA256

    f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba

    SHA512

    8bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75

  • C:\Users\Admin\AppData\Roaming\wd.exe

    Filesize

    6KB

    MD5

    8958d73eee15ff6566a97afb119b41d6

    SHA1

    f43d25ad3a587746108d2863c97512d7f15ce0b2

    SHA256

    a4897d3b6ab56138ece84246e7635df1c71adf900fedeaf9a724dac4bc17d4bd

    SHA512

    ca9d48cf490fbc7fec8d1814023cc5ca3b6a12a97165fb57781b72bf5211865c68468b16b223ae2495a472d713b95a544a357d199efff861f5ee390dbf16f255

  • C:\Users\Admin\AppData\Roaming\wd.exe

    Filesize

    6KB

    MD5

    8958d73eee15ff6566a97afb119b41d6

    SHA1

    f43d25ad3a587746108d2863c97512d7f15ce0b2

    SHA256

    a4897d3b6ab56138ece84246e7635df1c71adf900fedeaf9a724dac4bc17d4bd

    SHA512

    ca9d48cf490fbc7fec8d1814023cc5ca3b6a12a97165fb57781b72bf5211865c68468b16b223ae2495a472d713b95a544a357d199efff861f5ee390dbf16f255

  • \Program Files (x86)\Microsoft Services\symgr.exe

    Filesize

    185KB

    MD5

    87da96422cbb87d1d5dddf3020bdf113

    SHA1

    ace3f2d581e2f0467c81701624db41097624e3e6

    SHA256

    f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba

    SHA512

    8bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75

  • \Program Files (x86)\Microsoft Services\symgr.exe

    Filesize

    185KB

    MD5

    87da96422cbb87d1d5dddf3020bdf113

    SHA1

    ace3f2d581e2f0467c81701624db41097624e3e6

    SHA256

    f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba

    SHA512

    8bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75

  • \Program Files (x86)\Microsoft Services\symgr.exe

    Filesize

    185KB

    MD5

    87da96422cbb87d1d5dddf3020bdf113

    SHA1

    ace3f2d581e2f0467c81701624db41097624e3e6

    SHA256

    f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba

    SHA512

    8bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75

  • \Users\Admin\AppData\Roaming\wd.exe

    Filesize

    6KB

    MD5

    8958d73eee15ff6566a97afb119b41d6

    SHA1

    f43d25ad3a587746108d2863c97512d7f15ce0b2

    SHA256

    a4897d3b6ab56138ece84246e7635df1c71adf900fedeaf9a724dac4bc17d4bd

    SHA512

    ca9d48cf490fbc7fec8d1814023cc5ca3b6a12a97165fb57781b72bf5211865c68468b16b223ae2495a472d713b95a544a357d199efff861f5ee390dbf16f255

  • memory/268-64-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/268-59-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/268-69-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/268-70-0x00000000021A5000-0x00000000021B6000-memory.dmp

    Filesize

    68KB

  • memory/268-104-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/268-60-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/268-66-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/268-56-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/268-57-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/268-61-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/268-94-0x00000000021A5000-0x00000000021B6000-memory.dmp

    Filesize

    68KB

  • memory/268-93-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/484-86-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/1700-102-0x0000000000C15000-0x0000000000C26000-memory.dmp

    Filesize

    68KB

  • memory/1700-101-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/1700-92-0x0000000000C15000-0x0000000000C26000-memory.dmp

    Filesize

    68KB

  • memory/1700-91-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/1768-68-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/1768-54-0x0000000076961000-0x0000000076963000-memory.dmp

    Filesize

    8KB

  • memory/1768-55-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/1928-100-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB

  • memory/1928-103-0x0000000074DB0000-0x000000007535B000-memory.dmp

    Filesize

    5.7MB