Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe
Resource
win10v2004-20220812-en
General
-
Target
3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe
-
Size
1.5MB
-
MD5
72a560f225ce7f34a7413015b3fd36e8
-
SHA1
9fb9321507b4229c587fc2906857f4a00c996c1e
-
SHA256
3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823
-
SHA512
af2fb22a77b5353ccf08223725ff5596e33379b96860c7407e4b4b2b5f50510521ef452396a34d0c23b59b9b5ef2e3b58b3f21db4ff6442d339dea49f900120d
-
SSDEEP
24576:Bpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGL:6cZC35VcOcmDcc6Cd1
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 844 set thread context of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1136 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1724 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 1724 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 1724 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 1724 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 1724 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 844 wrote to memory of 992 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 27 PID 844 wrote to memory of 992 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 27 PID 844 wrote to memory of 992 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 27 PID 844 wrote to memory of 992 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 27 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 992 wrote to memory of 1136 992 cmd.exe 30 PID 992 wrote to memory of 1136 992 cmd.exe 30 PID 992 wrote to memory of 1136 992 cmd.exe 30 PID 992 wrote to memory of 1136 992 cmd.exe 30 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29 PID 844 wrote to memory of 1724 844 3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe"C:\Users\Admin\AppData\Local\Temp\3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:1136
-
-
-
C:\Users\Admin\AppData\Local\Temp\3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe"C:\Users\Admin\AppData\Local\Temp\3fa5daf8721536ac6dd3e57eccaea074facad601c4a4901ec083c5f23c789823.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-