Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe
Resource
win10v2004-20221111-en
General
-
Target
17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe
-
Size
271KB
-
MD5
0d9872faa1d16415b0185bc4f58ea34d
-
SHA1
c0373bec05812cc8887e4e762a0b355342195639
-
SHA256
17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e
-
SHA512
e07ef475347c80689fe06c117c5019f682303f2e6bcea2dcabb589fa7391fea857df9a4140dd508345a8433662b5e1b321ce937802f5f3f9149b49f615f7fb9d
-
SSDEEP
6144:CV92MnB1bCmlOwI3GdZHM+oEs5JDvdyGX8ctlD+:0FPYwsGfs+or5J6ID+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 892 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe -
Deletes itself 1 IoCs
pid Process 700 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zdfgfdgdfgfd = "C:\\Users\\Admin\\AppData\\Roaming\\Mirosoft\\ScvHost.exe" 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 844 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 892 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe Token: SeDebugPrivilege 892 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe Token: SeDebugPrivilege 892 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 892 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1364 wrote to memory of 892 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 28 PID 1364 wrote to memory of 892 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 28 PID 1364 wrote to memory of 892 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 28 PID 1364 wrote to memory of 892 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 28 PID 1364 wrote to memory of 700 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 29 PID 1364 wrote to memory of 700 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 29 PID 1364 wrote to memory of 700 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 29 PID 1364 wrote to memory of 700 1364 17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe 29 PID 700 wrote to memory of 844 700 cmd.exe 31 PID 700 wrote to memory of 844 700 cmd.exe 31 PID 700 wrote to memory of 844 700 cmd.exe 31 PID 700 wrote to memory of 844 700 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe"C:\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe"C:\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:844
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ff20f1a3aca185585723d8471a6842
SHA1cc5c8f7237fcb754ee58569921ee81a9c32b7eb9
SHA2563479df754d796b1257119ca99f394d376154cf5a112c967beef82a39f1770c13
SHA51210d6d282c7a4ebfb3726bed7eb283fe234877592fd71aaf7bab45ea0eab6796b7e0c9e701b1bee4757be6db35a145f334d8c888f631a34eab228a321cd66ac3a
-
C:\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe
Filesize271KB
MD50d9872faa1d16415b0185bc4f58ea34d
SHA1c0373bec05812cc8887e4e762a0b355342195639
SHA25617f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e
SHA512e07ef475347c80689fe06c117c5019f682303f2e6bcea2dcabb589fa7391fea857df9a4140dd508345a8433662b5e1b321ce937802f5f3f9149b49f615f7fb9d
-
C:\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe
Filesize271KB
MD50d9872faa1d16415b0185bc4f58ea34d
SHA1c0373bec05812cc8887e4e762a0b355342195639
SHA25617f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e
SHA512e07ef475347c80689fe06c117c5019f682303f2e6bcea2dcabb589fa7391fea857df9a4140dd508345a8433662b5e1b321ce937802f5f3f9149b49f615f7fb9d
-
\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe
Filesize271KB
MD50d9872faa1d16415b0185bc4f58ea34d
SHA1c0373bec05812cc8887e4e762a0b355342195639
SHA25617f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e
SHA512e07ef475347c80689fe06c117c5019f682303f2e6bcea2dcabb589fa7391fea857df9a4140dd508345a8433662b5e1b321ce937802f5f3f9149b49f615f7fb9d
-
\Users\Admin\AppData\Local\Temp\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e\17f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e.exe
Filesize271KB
MD50d9872faa1d16415b0185bc4f58ea34d
SHA1c0373bec05812cc8887e4e762a0b355342195639
SHA25617f10fac1f728312eb781c8aef416da314eba5fdc9d37423ab0684c5340b414e
SHA512e07ef475347c80689fe06c117c5019f682303f2e6bcea2dcabb589fa7391fea857df9a4140dd508345a8433662b5e1b321ce937802f5f3f9149b49f615f7fb9d