Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
923f0f8a50...a1.vhd
windows7-x64
3923f0f8a50...a1.vhd
windows10-2004-x64
3out.vhd
windows7-x64
1out.vhd
windows10-2004-x64
1$RECYCLE.B...op.ini
windows7-x64
1$RECYCLE.B...op.ini
windows10-2004-x64
1AdFind.exe
windows7-x64
1AdFind.exe
windows10-2004-x64
1System Vol...meGuid
windows7-x64
1System Vol...meGuid
windows10-2004-x64
1System Vol...gs.dat
windows7-x64
3System Vol...gs.dat
windows10-2004-x64
3Analysis
-
max time kernel
101s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
923f0f8a50fd980789625fa96abff0707a233e75ef83c31b863781d216d743a1.vhd
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
923f0f8a50fd980789625fa96abff0707a233e75ef83c31b863781d216d743a1.vhd
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
out.vhd
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
out.vhd
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
$RECYCLE.BIN/S-1-5-21-1260530178-3479854673-1021568482-500/desktop.ini
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
$RECYCLE.BIN/S-1-5-21-1260530178-3479854673-1021568482-500/desktop.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
AdFind.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
AdFind.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
System Volume Information/IndexerVolumeGuid
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
System Volume Information/IndexerVolumeGuid
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
System Volume Information/WPSettings.dat
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
System Volume Information/WPSettings.dat
Resource
win10v2004-20221111-en
General
-
Target
System Volume Information/WPSettings.dat
-
Size
12B
-
MD5
66947a5c034670af9a00be2fef9cf4db
-
SHA1
fe9ed00468dcf3229a89bc8af346b0b8cfd9d253
-
SHA256
67384e6be7897bda9eeb546a78b6b0bcb3b614e1279a128f0098a1918f977bde
-
SHA512
cf8ea6ff0d73206c6559c5e98aec0d439ff5efd902f38a0e00705d7effb421fbe660a9bf71dfac537a95f285b3b3353de3750cd61dc22c628a368fbb46fcc90d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 268 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 268 1048 cmd.exe 28 PID 1048 wrote to memory of 268 1048 cmd.exe 28 PID 1048 wrote to memory of 268 1048 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"1⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:268
-