Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 12:14

General

  • Target

    c5f9e877204425477ffa47734827cd95b7bf081df1eba4c81e114c3007c107d7.exe

  • Size

    156KB

  • MD5

    8cbb847d4b417c7890e971fa1816e47e

  • SHA1

    431e993c91ef518391120a3d6c7d4cdaa8892d92

  • SHA256

    c5f9e877204425477ffa47734827cd95b7bf081df1eba4c81e114c3007c107d7

  • SHA512

    639512f9a8f05f6fca820eaf2a66934b5cb738dc01bd62fcf9c5e3f06c1c9dd7c725031d24a024f2fa11e28050ba49d2db91ed95d6649bfc76a12ea2c0d14c7f

  • SSDEEP

    3072:D/JNqhkWYneP6Gz8pB00e+te46Jkw76aDEmmBsBX4XSYJPkB3K3Wn3GAtUY:DRNqan00e+W2N/i4JPkBK3Wn3GAtV

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5f9e877204425477ffa47734827cd95b7bf081df1eba4c81e114c3007c107d7.exe
    "C:\Users\Admin\AppData\Local\Temp\c5f9e877204425477ffa47734827cd95b7bf081df1eba4c81e114c3007c107d7.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Installs/modifies Browser Helper Object
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1848
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\SysWOW64\regsvr32.exe /s c:\Users\Admin\sprsmsto\sprsmsto.dll
      2⤵
        PID:600
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /s c:\Users\Admin\sprsmsto\sprsmsto.dll
        2⤵
          PID:1396
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:828
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:2
            3⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1860

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PSIFVR7Q.txt

        Filesize

        608B

        MD5

        a32c9b6804af4bb8cc2b33ba3d69c223

        SHA1

        4248138a2152adac693b5ff960c566de65eb7900

        SHA256

        e4d524f597b49abe71f90cc8052b9bf42efd55166b191fd16bc02f351bc39520

        SHA512

        3cc433629cd48a5c1dcb15374711255109f6abe3c6b0ecccd56306d03fa2c18307a7fadd0513756346ca19c1d96fabea3aa559489a97f09f9f301ef89970f7f3

      • memory/1848-56-0x0000000076091000-0x0000000076093000-memory.dmp

        Filesize

        8KB