Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe
Resource
win10v2004-20221111-en
General
-
Target
2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe
-
Size
292KB
-
MD5
2bec47844b2158b8971395794301e712
-
SHA1
85e9fe6a3118fa5bf352fef7ecf8b711a45a3968
-
SHA256
2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809
-
SHA512
e0d492b85856f4a7e675fe30fbc223573dd214e12dd7b043ac84f10098477181ae59f04aa44a389159f39c91820268e02dc9d4a79910846d0da92241023c277a
-
SSDEEP
6144:UwcYntNJbzX8qhqEIJHqvzRb8zCgoniL2L0U1wer6:UwcYLJ///IJydbXqU1Bm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe" WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1508 set thread context of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2032 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe Token: SeDebugPrivilege 2032 CasPol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2032 CasPol.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 2032 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 26 PID 1508 wrote to memory of 768 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 27 PID 1508 wrote to memory of 768 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 27 PID 1508 wrote to memory of 768 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 27 PID 1508 wrote to memory of 768 1508 2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe 27 PID 768 wrote to memory of 928 768 cmd.exe 29 PID 768 wrote to memory of 928 768 cmd.exe 29 PID 768 wrote to memory of 928 768 cmd.exe 29 PID 768 wrote to memory of 928 768 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe"C:\Users\Admin\AppData\Local\Temp\2ad0fca6351e2690fabb0e4120105cf37473e6389356a0d1ea406339d3a53809.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\windows\microsoft.net\framework\v2.0.50727\CasPol.exe"c:\windows\microsoft.net\framework\v2.0.50727\CasPol.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\fuckyounod32.vbs"3⤵
- Adds Run key to start application
PID:928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD5b559ac384267491c0796d801b39e4979
SHA16762fd6ee2849c743dfd2e3d6743b3f26bc32b9d
SHA25685f64caab11088c4fa85d0caebc9086178eeef9e322be7034311cf466430302e
SHA512292df546edec7225fca39816d4171924ced925ca00d316d7694ecfb00a2cb4d81315493e2af759121795413a5e0116abcd11b5003e332fec3a5dcf40fc24de7e