Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 07:24

General

  • Target

    c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe

  • Size

    221KB

  • MD5

    596750f8bc7c1b8d15e2ed18995cb167

  • SHA1

    a3adcd5f65d303a566206696ab4b02150a9ecc97

  • SHA256

    c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9

  • SHA512

    72f3ffde1db036fbdf1cbfabc5d7dd84f284f1607f60b9e8756be4106217a8cf1db003e3dbf86f9a593dea6f36f8c130eccfe662ef43514e64d327dd3ed282fb

  • SSDEEP

    6144:pwHys8jsO3Mor+1MfgdCVtoAmNS3MECTphNDv3:SqsOTrEouCVtoq8ECTphN/

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe
    "C:\Users\Admin\AppData\Local\Temp\c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe
      "C:\Users\Admin\AppData\Local\Temp\c911931abc119b6cc53a934ba0ea7da27a10aa19cf898fb82607ea7f057175f9.exe"
      2⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsd5DEA.tmp\figurant.dll

    Filesize

    21KB

    MD5

    8c31c49be6cbaeebcbf9704bb2ac9829

    SHA1

    8fb33105b56c1aa8f52ab661b8af14df8f2b3bd3

    SHA256

    966569e692689d1c809168820db467d10d0cd53a70ac25969e2cd5221c99dec5

    SHA512

    a39333d1d801eafe00abc406f6e08942dc6f32ab4a3c2368d3648cae28856786e20ae5f8769a04c40ef561d5c6c7f4eb0e70fd5124136113e595c47532be81bf

  • memory/240-92-0x0000000001150000-0x0000000001155000-memory.dmp

    Filesize

    20KB

  • memory/260-78-0x0000000000110000-0x0000000000115000-memory.dmp

    Filesize

    20KB

  • memory/332-79-0x0000000000830000-0x0000000000835000-memory.dmp

    Filesize

    20KB

  • memory/368-80-0x00000000000D0000-0x00000000000D5000-memory.dmp

    Filesize

    20KB

  • memory/384-81-0x00000000006F0000-0x00000000006F5000-memory.dmp

    Filesize

    20KB

  • memory/388-93-0x0000000001B80000-0x0000000001B85000-memory.dmp

    Filesize

    20KB

  • memory/420-82-0x0000000000670000-0x0000000000675000-memory.dmp

    Filesize

    20KB

  • memory/464-83-0x00000000000F0000-0x00000000000F5000-memory.dmp

    Filesize

    20KB

  • memory/480-84-0x00000000000F0000-0x00000000000F5000-memory.dmp

    Filesize

    20KB

  • memory/488-85-0x0000000000190000-0x0000000000195000-memory.dmp

    Filesize

    20KB

  • memory/592-89-0x0000000000390000-0x0000000000395000-memory.dmp

    Filesize

    20KB

  • memory/672-86-0x0000000000340000-0x0000000000345000-memory.dmp

    Filesize

    20KB

  • memory/756-90-0x00000000007D0000-0x00000000007D5000-memory.dmp

    Filesize

    20KB

  • memory/768-94-0x00000000023C0000-0x0000000002584000-memory.dmp

    Filesize

    1.8MB

  • memory/768-76-0x0000000000D30000-0x0000000000FB1000-memory.dmp

    Filesize

    2.5MB

  • memory/768-77-0x0000000000160000-0x0000000000165000-memory.dmp

    Filesize

    20KB

  • memory/768-75-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/768-74-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB

  • memory/796-59-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/796-57-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/796-64-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/796-66-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/796-63-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/796-70-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/796-56-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/796-61-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/796-71-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/800-91-0x00000000007F0000-0x00000000007F5000-memory.dmp

    Filesize

    20KB

  • memory/836-87-0x0000000000090000-0x0000000000095000-memory.dmp

    Filesize

    20KB

  • memory/872-88-0x0000000000AD0000-0x0000000000AD5000-memory.dmp

    Filesize

    20KB

  • memory/1036-96-0x0000000000200000-0x0000000000205000-memory.dmp

    Filesize

    20KB

  • memory/1132-95-0x0000000001E20000-0x0000000001E25000-memory.dmp

    Filesize

    20KB

  • memory/1236-98-0x0000000000120000-0x0000000000125000-memory.dmp

    Filesize

    20KB

  • memory/1280-97-0x0000000002B20000-0x0000000002B25000-memory.dmp

    Filesize

    20KB

  • memory/1280-109-0x000007FEF6690000-0x000007FEF67D3000-memory.dmp

    Filesize

    1.3MB

  • memory/1280-110-0x000007FF347F0000-0x000007FF347FA000-memory.dmp

    Filesize

    40KB

  • memory/1344-99-0x0000000000100000-0x0000000000105000-memory.dmp

    Filesize

    20KB

  • memory/1544-54-0x00000000764C1000-0x00000000764C3000-memory.dmp

    Filesize

    8KB

  • memory/1792-100-0x0000000000760000-0x0000000000765000-memory.dmp

    Filesize

    20KB

  • memory/1944-102-0x00000000001A0000-0x00000000001A5000-memory.dmp

    Filesize

    20KB

  • memory/1976-101-0x0000000000280000-0x0000000000285000-memory.dmp

    Filesize

    20KB