Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe
Resource
win10v2004-20220812-en
General
-
Target
993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe
-
Size
394KB
-
MD5
4c6b88b2c0c75bf38d88826995a4204c
-
SHA1
08b3ade2efba22b5c758f42197dd642ae48138a9
-
SHA256
993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522
-
SHA512
8886ddeab05a97e1fa3f39b8132b9bb759a745d11d961f6c16497095861bc841a8ffa06db029158eccf74447eef0880e8ad30e0584d14e3cfb91c24380b099a6
-
SSDEEP
6144:DCm3gJX5z2ODOUlSZF64zfINQIVK7gAtqGIaH+5UpWPgPta/qe9xvAZZC/fREKGO:DeZ9/Tp2QfK7XfH+5zPgV3s6Zo5EK2G
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1120 set thread context of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1200 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1116 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe Token: SeDebugPrivilege 1116 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1560 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 27 PID 1120 wrote to memory of 1560 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 27 PID 1120 wrote to memory of 1560 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 27 PID 1120 wrote to memory of 1560 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 27 PID 1560 wrote to memory of 1200 1560 cmd.exe 29 PID 1560 wrote to memory of 1200 1560 cmd.exe 29 PID 1560 wrote to memory of 1200 1560 cmd.exe 29 PID 1560 wrote to memory of 1200 1560 cmd.exe 29 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30 PID 1120 wrote to memory of 1116 1120 993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe"C:\Users\Admin\AppData\Local\Temp\993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c PING 127.0.0.1 -n 10 > nul2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 103⤵
- Runs ping.exe
PID:1200
-
-
-
C:\Users\Admin\AppData\Local\Temp\993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe"C:\Users\Admin\AppData\Local\Temp\993f3ca57197b1a47adf464f599625fd65b1ec06d08887160aebfafa27ac8522.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116
-