Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 22:30

General

  • Target

    1.08.exe

  • Size

    2.9MB

  • MD5

    3984dd1bbadf1e28e79018aa86f63a4d

  • SHA1

    68ecec1582a509d74c5157148b2940a20a6eb725

  • SHA256

    611a8d361d04a71e5d5fa72cc8b24665fd8f09c39c3d4902f69e3c8c8e3e37a7

  • SHA512

    af3ed54732d1b0f9a96926d9fc3c793b128c9f895e7117ffbe322403ea844b924b885cc2b066024fb1df510e80d946dc618ce3a08abd6a68a036681e7dad7aa6

  • SSDEEP

    49152:0ypa4po00ODZCPLFDoOIV38iFUYgc+qY/NBqRp1vbp6jHlVgkc1jYCASMO70mbdl:0d4ykFCBU7tmncmsp5kHlEnP0mbdE3qz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.08.exe
    "C:\Users\Admin\AppData\Local\Temp\1.08.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\is-VAJ24.tmp\1.08.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-VAJ24.tmp\1.08.tmp" /SL5="$D0152,2830081,72704,C:\Users\Admin\AppData\Local\Temp\1.08.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-VAJ24.tmp\1.08.tmp

    Filesize

    694KB

    MD5

    ce9f5fb67f79ac919a7029331728aed0

    SHA1

    9f4c20cabc6f4b920362b9ec5d939237f332c3d2

    SHA256

    0e379fac5f64bb9b7788478f40df4f0f7d20db46abf010276825d0115f65a856

    SHA512

    8d828bded5e9cf3a5eb4a9d292dca6249f9be6c08142f2ad6243ae2a751b84e329c4529f2de247e87d9a40ac87f750aede368c79f3bbce74c5f917362378bdb9

  • C:\Users\Admin\AppData\Local\Temp\is-VAJ24.tmp\1.08.tmp

    Filesize

    694KB

    MD5

    ce9f5fb67f79ac919a7029331728aed0

    SHA1

    9f4c20cabc6f4b920362b9ec5d939237f332c3d2

    SHA256

    0e379fac5f64bb9b7788478f40df4f0f7d20db46abf010276825d0115f65a856

    SHA512

    8d828bded5e9cf3a5eb4a9d292dca6249f9be6c08142f2ad6243ae2a751b84e329c4529f2de247e87d9a40ac87f750aede368c79f3bbce74c5f917362378bdb9

  • \Users\Admin\AppData\Local\Temp\is-HGR6P.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-HGR6P.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-VAJ24.tmp\1.08.tmp

    Filesize

    694KB

    MD5

    ce9f5fb67f79ac919a7029331728aed0

    SHA1

    9f4c20cabc6f4b920362b9ec5d939237f332c3d2

    SHA256

    0e379fac5f64bb9b7788478f40df4f0f7d20db46abf010276825d0115f65a856

    SHA512

    8d828bded5e9cf3a5eb4a9d292dca6249f9be6c08142f2ad6243ae2a751b84e329c4529f2de247e87d9a40ac87f750aede368c79f3bbce74c5f917362378bdb9

  • memory/2028-54-0x0000000075A71000-0x0000000075A73000-memory.dmp

    Filesize

    8KB

  • memory/2028-55-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2028-64-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB