Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
247s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe
Resource
win10v2004-20221111-en
General
-
Target
b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe
-
Size
1.5MB
-
MD5
1a60ada652d623902e38c133e01761de
-
SHA1
83de2362ef7b8ba7469d624379985ac3798f0a2c
-
SHA256
b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a
-
SHA512
fa7cfaccb9710b71c7a849d2c16e36259a6227f98dc97d9ba8c6eea2c59771a3bb810c3834ac4baff0436cfde8fd6c093cf9fd77591e07b609a7f38cc160d5b9
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGC:wcZC35VcOcmDcc6CdU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1120 PING.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 892 wrote to memory of 2012 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 28 PID 892 wrote to memory of 2012 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 28 PID 892 wrote to memory of 2012 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 28 PID 892 wrote to memory of 2012 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 28 PID 892 wrote to memory of 1912 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 30 PID 892 wrote to memory of 1912 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 30 PID 892 wrote to memory of 1912 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 30 PID 892 wrote to memory of 1912 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 30 PID 892 wrote to memory of 1912 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 30 PID 892 wrote to memory of 1912 892 b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe 30 PID 2012 wrote to memory of 1120 2012 cmd.exe 31 PID 2012 wrote to memory of 1120 2012 cmd.exe 31 PID 2012 wrote to memory of 1120 2012 cmd.exe 31 PID 2012 wrote to memory of 1120 2012 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe"C:\Users\Admin\AppData\Local\Temp\b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:1120
-
-
-
C:\Users\Admin\AppData\Local\Temp\b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe"C:\Users\Admin\AppData\Local\Temp\b097e68c05608afa3e0d3bdbd5546616639615d9404af1c34d37fc9451e15f9a.exe"2⤵PID:1912
-