Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 00:02
Behavioral task
behavioral1
Sample
d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe
Resource
win10v2004-20221111-en
General
-
Target
d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe
-
Size
28KB
-
MD5
08277ffd0604662786bcab74fadb9f58
-
SHA1
65293437403509b08e9f83f1aa40e62540d35948
-
SHA256
d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf
-
SHA512
0d4195f31465083ac69e07633eb183d46c4c10625f176e913ef13b315711f116160c5573f7e67da8731f5505cfe7651e026e2a7541be164644443d0b658673b2
-
SSDEEP
768:OqbOQqUkKytQPMKDzdkL0OzU0LMqCbQ0e:ka9DeLRelbQ0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1388 Windows.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1192 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\55b3825ee39ada2fcddf7c7accbde69e.exe Windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\55b3825ee39ada2fcddf7c7accbde69e.exe Windows.exe -
Loads dropped DLL 1 IoCs
pid Process 1072 d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\55b3825ee39ada2fcddf7c7accbde69e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows.exe\" .." Windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\55b3825ee39ada2fcddf7c7accbde69e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows.exe\" .." Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe 1388 Windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1388 Windows.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1388 1072 d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe 27 PID 1072 wrote to memory of 1388 1072 d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe 27 PID 1072 wrote to memory of 1388 1072 d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe 27 PID 1072 wrote to memory of 1388 1072 d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe 27 PID 1388 wrote to memory of 1192 1388 Windows.exe 28 PID 1388 wrote to memory of 1192 1388 Windows.exe 28 PID 1388 wrote to memory of 1192 1388 Windows.exe 28 PID 1388 wrote to memory of 1192 1388 Windows.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe"C:\Users\Admin\AppData\Local\Temp\d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Windows.exe"C:\Users\Admin\AppData\Local\Temp\Windows.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Windows.exe" "Windows.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1192
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD508277ffd0604662786bcab74fadb9f58
SHA165293437403509b08e9f83f1aa40e62540d35948
SHA256d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf
SHA5120d4195f31465083ac69e07633eb183d46c4c10625f176e913ef13b315711f116160c5573f7e67da8731f5505cfe7651e026e2a7541be164644443d0b658673b2
-
Filesize
28KB
MD508277ffd0604662786bcab74fadb9f58
SHA165293437403509b08e9f83f1aa40e62540d35948
SHA256d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf
SHA5120d4195f31465083ac69e07633eb183d46c4c10625f176e913ef13b315711f116160c5573f7e67da8731f5505cfe7651e026e2a7541be164644443d0b658673b2
-
Filesize
28KB
MD508277ffd0604662786bcab74fadb9f58
SHA165293437403509b08e9f83f1aa40e62540d35948
SHA256d9d60842f711185749339f0fab952a56ee4af7c471f5256c1d76f3a6b1de9cdf
SHA5120d4195f31465083ac69e07633eb183d46c4c10625f176e913ef13b315711f116160c5573f7e67da8731f5505cfe7651e026e2a7541be164644443d0b658673b2