Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe
Resource
win10v2004-20220812-en
General
-
Target
363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe
-
Size
328KB
-
MD5
3e2f2d4cccf3fcda61a4cc2a3d378a45
-
SHA1
a0efa4e3292b2a105b0491147a6760a294819819
-
SHA256
363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847
-
SHA512
b5a21b053a5b39ca5f64aa5beabffe8eb9085c5ac6e314e4af44e1570a28c5ac9609ade4f9a4df827de91d576f8190e41a10865f83a005827916535fd023ea98
-
SSDEEP
6144:dudETpa3kcP6ATyqEqAUXvwvGJwSTBaRlgweSq+VWre+e6eQuYeGsdVYlJC:0dYq9b2qEqAUXvwvGOSTQvkUV0GjGsdV
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ydetuvwg = "\"C:\\Windows\\ucijekan.exe\"" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1308 set thread context of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1148 set thread context of 1096 1148 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ucijekan.exe explorer.exe File created C:\Windows\ucijekan.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1684 vssadmin.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 596 vssvc.exe Token: SeRestorePrivilege 596 vssvc.exe Token: SeAuditPrivilege 596 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1308 wrote to memory of 1148 1308 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 27 PID 1148 wrote to memory of 1096 1148 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 28 PID 1148 wrote to memory of 1096 1148 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 28 PID 1148 wrote to memory of 1096 1148 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 28 PID 1148 wrote to memory of 1096 1148 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 28 PID 1148 wrote to memory of 1096 1148 363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe 28 PID 1096 wrote to memory of 1684 1096 explorer.exe 29 PID 1096 wrote to memory of 1684 1096 explorer.exe 29 PID 1096 wrote to memory of 1684 1096 explorer.exe 29 PID 1096 wrote to memory of 1684 1096 explorer.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe"C:\Users\Admin\AppData\Local\Temp\363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exeC:\Users\Admin\AppData\Local\Temp\363542759158ea906b1335331528a7e0af6d5c330011f262e1003669ce9fb847.exe2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer Phishing Filter
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:1684
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD54a31a829ef375449485b3973d04735d0
SHA163912b107e2ad7c69c602f786fd745902c41a0c0
SHA25631d780094b342408dc5e168ed4b7541ffe566e0a537f5abdcde728987da02271
SHA5124a912acf144d5ae9cc9b270ab787bd4f2ca3bc85b35f5e7926c2ab11f4c68a20bebb21dbe3d97398d6cde1d3c181580ab56b2cb9e5f81394a1efc01c821661a8