Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe
Resource
win10v2004-20220812-en
General
-
Target
9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe
-
Size
1.5MB
-
MD5
954872d5793b3b6449693086b4b29438
-
SHA1
955cd03c84e85cc1da36dafa1de2807d09fb4086
-
SHA256
9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db
-
SHA512
6cd16267c3c1e45ac9917e1c6cbe49ac606de52d131e8cc1793d12ea93c70a6e5627f1e4571fea101929bf5a0945e157cf3d20f0ca105f7a7adabd38d3a7be01
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGP:wcZC35VcOcmDcc6Cdt
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 544 set thread context of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1440 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1772 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 1772 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 1772 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 1772 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 1772 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 544 wrote to memory of 1964 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 26 PID 544 wrote to memory of 1964 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 26 PID 544 wrote to memory of 1964 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 26 PID 544 wrote to memory of 1964 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 26 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 1964 wrote to memory of 1440 1964 cmd.exe 29 PID 1964 wrote to memory of 1440 1964 cmd.exe 29 PID 1964 wrote to memory of 1440 1964 cmd.exe 29 PID 1964 wrote to memory of 1440 1964 cmd.exe 29 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28 PID 544 wrote to memory of 1772 544 9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe"C:\Users\Admin\AppData\Local\Temp\9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:1440
-
-
-
C:\Users\Admin\AppData\Local\Temp\9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe"C:\Users\Admin\AppData\Local\Temp\9f2aa19859e7824997584bd1898d0bb5d9343ae7f23bdf3b43741316833820db.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1772
-