Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe
Resource
win10v2004-20220812-en
General
-
Target
a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe
-
Size
143KB
-
MD5
65bc032da592e4972fdbf98ca84e5ad2
-
SHA1
8a372c152a3899e13ff1b343123579a568f7d81b
-
SHA256
a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb
-
SHA512
e3d0e2de990816bbdc1d19985ab3607cf81156e84dff4613a1c2d6559e622d75d5636155521662c029b30393217da12bcc84a324b7fd12384544d29a2c9fe9bc
-
SSDEEP
3072:aKDAfCDSmJnBR7Lyn+m53WVuxsIOLmIxPQtJvb:aRXng03OLVIzT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1588 zizomidi.exe -
Loads dropped DLL 3 IoCs
pid Process 2020 a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe 1588 zizomidi.exe 1588 zizomidi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1588 zizomidi.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1588 2020 a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe 26 PID 2020 wrote to memory of 1588 2020 a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe 26 PID 2020 wrote to memory of 1588 2020 a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe 26 PID 2020 wrote to memory of 1588 2020 a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe 26 PID 2020 wrote to memory of 1588 2020 a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe 26 PID 2020 wrote to memory of 1588 2020 a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe 26 PID 2020 wrote to memory of 1588 2020 a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe"C:\Users\Admin\AppData\Local\Temp\a77f838b150c89c4ffefc20ed426aa7d841217b539bcbb7ee6839a6203ada1cb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\zizomidi.exe"C:\Users\Admin\AppData\Local\Temp\zizomidi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD562ff2cc976d664786849e5612d941bf1
SHA1b3ba9ff53d965f4f10547018141deaaa9c9d1fdd
SHA25698f8a979118906fdf06b2487ef4c1e30d207168e3b59ddfffab3b141a02372d9
SHA512bdad582026d2baa9ab7040bce4624caed39575fa10144f2eb7b8ac199d6fc02a31d7f8fb952f52cb52b90f3384983bd576028dd9bd618c56608161313e491374
-
Filesize
17KB
MD562ff2cc976d664786849e5612d941bf1
SHA1b3ba9ff53d965f4f10547018141deaaa9c9d1fdd
SHA25698f8a979118906fdf06b2487ef4c1e30d207168e3b59ddfffab3b141a02372d9
SHA512bdad582026d2baa9ab7040bce4624caed39575fa10144f2eb7b8ac199d6fc02a31d7f8fb952f52cb52b90f3384983bd576028dd9bd618c56608161313e491374
-
Filesize
17KB
MD562ff2cc976d664786849e5612d941bf1
SHA1b3ba9ff53d965f4f10547018141deaaa9c9d1fdd
SHA25698f8a979118906fdf06b2487ef4c1e30d207168e3b59ddfffab3b141a02372d9
SHA512bdad582026d2baa9ab7040bce4624caed39575fa10144f2eb7b8ac199d6fc02a31d7f8fb952f52cb52b90f3384983bd576028dd9bd618c56608161313e491374
-
Filesize
17KB
MD562ff2cc976d664786849e5612d941bf1
SHA1b3ba9ff53d965f4f10547018141deaaa9c9d1fdd
SHA25698f8a979118906fdf06b2487ef4c1e30d207168e3b59ddfffab3b141a02372d9
SHA512bdad582026d2baa9ab7040bce4624caed39575fa10144f2eb7b8ac199d6fc02a31d7f8fb952f52cb52b90f3384983bd576028dd9bd618c56608161313e491374
-
Filesize
17KB
MD562ff2cc976d664786849e5612d941bf1
SHA1b3ba9ff53d965f4f10547018141deaaa9c9d1fdd
SHA25698f8a979118906fdf06b2487ef4c1e30d207168e3b59ddfffab3b141a02372d9
SHA512bdad582026d2baa9ab7040bce4624caed39575fa10144f2eb7b8ac199d6fc02a31d7f8fb952f52cb52b90f3384983bd576028dd9bd618c56608161313e491374