Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe
Resource
win10v2004-20221111-en
General
-
Target
0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe
-
Size
191KB
-
MD5
6f204ac7e40d82963c7c1a1449acfea2
-
SHA1
36ab86149523ecd1dd6210285de9777c24ab3708
-
SHA256
0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666
-
SHA512
efacc891f4af15024af7127dc60b2907468bfc0cec6fbbf14505bb908bb987031c475e1d61447b451035650229b4172ebf3489f6bd786c7512b073e2dd10c14d
-
SSDEEP
3072:jiDZW9tCFUkd8nS5JTEc5f/xk9T+bcngp2h7XRNKhBlw/3f/gbAi3:jiI9thk2S5P5f/xk9T+wngcVeBIH8Ai
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 760 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1764 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe Trojan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe Trojan.exe -
Loads dropped DLL 2 IoCs
pid Process 1504 0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe 1504 0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new 0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new 0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe 760 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 760 Trojan.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1504 wrote to memory of 760 1504 0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe 26 PID 1504 wrote to memory of 760 1504 0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe 26 PID 1504 wrote to memory of 760 1504 0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe 26 PID 1504 wrote to memory of 760 1504 0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe 26 PID 760 wrote to memory of 1764 760 Trojan.exe 27 PID 760 wrote to memory of 1764 760 Trojan.exe 27 PID 760 wrote to memory of 1764 760 Trojan.exe 27 PID 760 wrote to memory of 1764 760 Trojan.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe"C:\Users\Admin\AppData\Local\Temp\0ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD56f204ac7e40d82963c7c1a1449acfea2
SHA136ab86149523ecd1dd6210285de9777c24ab3708
SHA2560ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666
SHA512efacc891f4af15024af7127dc60b2907468bfc0cec6fbbf14505bb908bb987031c475e1d61447b451035650229b4172ebf3489f6bd786c7512b073e2dd10c14d
-
Filesize
191KB
MD56f204ac7e40d82963c7c1a1449acfea2
SHA136ab86149523ecd1dd6210285de9777c24ab3708
SHA2560ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666
SHA512efacc891f4af15024af7127dc60b2907468bfc0cec6fbbf14505bb908bb987031c475e1d61447b451035650229b4172ebf3489f6bd786c7512b073e2dd10c14d
-
Filesize
1KB
MD54137d39ed1f415808b0e0faf7d26d150
SHA19598afb7583206e74b2c0b46a16ca20718c9d144
SHA256f55c5ce13a99c0813e41879a92aa05c0e2e954c171fa3617fd33ef6372afd9e8
SHA512e389782dd6577d32bcea7c96c5db9e3eddfb98980e52f7831ed5a9089e61b196146af65eafbcce1a578861f2e6f57001a36c5ddfcc082f6a3fc47953e9254733
-
Filesize
191KB
MD56f204ac7e40d82963c7c1a1449acfea2
SHA136ab86149523ecd1dd6210285de9777c24ab3708
SHA2560ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666
SHA512efacc891f4af15024af7127dc60b2907468bfc0cec6fbbf14505bb908bb987031c475e1d61447b451035650229b4172ebf3489f6bd786c7512b073e2dd10c14d
-
Filesize
191KB
MD56f204ac7e40d82963c7c1a1449acfea2
SHA136ab86149523ecd1dd6210285de9777c24ab3708
SHA2560ffc29f7463d4f00957d483a4a2d1841bddad5da3d1f243c5958ef5630928666
SHA512efacc891f4af15024af7127dc60b2907468bfc0cec6fbbf14505bb908bb987031c475e1d61447b451035650229b4172ebf3489f6bd786c7512b073e2dd10c14d