Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
改枪.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
改枪.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
最新QQ软件下载.url
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
最新QQ软件下载.url
Resource
win10v2004-20220812-en
General
-
Target
改枪.exe
-
Size
1.5MB
-
MD5
7d2e5610ea5fe795d2d896c4a4ee84ac
-
SHA1
a49f440a50ab7ed0addcaefd41a0910ab51e10ba
-
SHA256
3e1b059c68719b90399fde5f11e8e7ddbab76a7e7f9c740edb973756f7592454
-
SHA512
ae78baf2899e8114f5ceaef58f26f796e5f086e5e6cf7e1d6050b310acc64873d9dd40401a03129436700d7de8207765158f43aa802b74294bcd98405a8c5c10
-
SSDEEP
24576:tHsmDWASZgUx0tswA7pX8dUCwO3jEOXpaBj6643bamv28Pd3FOa8PKQOutHY6jCm:VZyA6x00p8y++jjwa8F5mR5Y6jCyE9o
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/368-4650-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\PastpJ9bt.sys 改枪.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
pid Process 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe 368 改枪.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 368 改枪.exe 368 改枪.exe 368 改枪.exe