Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 22:40 UTC

General

  • Target

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565.exe

  • Size

    276KB

  • MD5

    d4d1ef3438416b383eb52de196980936

  • SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

  • SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

  • SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • SSDEEP

    3072:9AzyaPGxAufmotkVzqx227rqI3kv6qr2cS4Vb9uFFFFFFFFFFFFFFFFFFFFMBtRE:9A+KBuop2XPqr44Vb9zrRWT

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565.exe
    "C:\Users\Admin\AppData\Local\Temp\b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe
      "C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe
        "C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe"
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:668
      • C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe
        "C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe" -reg C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe -proc 668 C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • \Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • \Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • \Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • \Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\h721.exe

    Filesize

    276KB

    MD5

    d4d1ef3438416b383eb52de196980936

    SHA1

    a264c7ec3434c08ac0380dc27f3f766867c6ba0e

    SHA256

    b01aba1da74e1749fd44ed90bb1cba201ee58dd5963409b36db0b0fbcda0b565

    SHA512

    9100ec5e0a6172b961c62707d41ece7dec071bd569803d3770466c3f633294ea72d5bc833aac69a7eff8efc29c2441cc1ddae0143958dac0a411b1acfd0cb714

  • memory/668-73-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/668-64-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/668-68-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/668-69-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/668-67-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/668-65-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/668-79-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/668-75-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/668-77-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/1112-78-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/1112-63-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/1112-87-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/1200-54-0x0000000076041000-0x0000000076043000-memory.dmp

    Filesize

    8KB

  • memory/1200-62-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/1200-55-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/1856-86-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

  • memory/1856-88-0x00000000749C0000-0x0000000074F6B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.