Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe
Resource
win10v2004-20220901-en
General
-
Target
0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe
-
Size
9.2MB
-
MD5
58a253944ded5623aee1a46c801d0a99
-
SHA1
c28f3d5794af7707699a7610e78a8e91c0552b42
-
SHA256
0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a
-
SHA512
78a4d936dafdec09994e7c02f90035b3e9ca002f0769364e89f671846afac9c06f506acb845b823b554d0300a507796dd28f27e35dc3d00b07884c380e970a59
-
SSDEEP
196608:we3H9CycWxqu7QDCOoisMvXpKYvYulYE0/ccNQ:we3dCy71kD4isMhGtcEQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1888 irsetup.exe -
resource yara_rule behavioral1/files/0x000b0000000122e9-55.dat upx behavioral1/files/0x000b0000000122e9-57.dat upx behavioral1/files/0x000b0000000122e9-60.dat upx behavioral1/files/0x000b0000000122e9-63.dat upx behavioral1/files/0x000b0000000122e9-62.dat upx behavioral1/files/0x000b0000000122e9-61.dat upx behavioral1/memory/1888-64-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral1/files/0x000b0000000122e9-67.dat upx behavioral1/memory/1888-75-0x0000000000400000-0x0000000000527000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 992 0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe 1888 irsetup.exe 1888 irsetup.exe 1888 irsetup.exe 1888 irsetup.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\list.tmp cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 108 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 108 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1888 irsetup.exe 1888 irsetup.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 992 wrote to memory of 1888 992 0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe 27 PID 992 wrote to memory of 1888 992 0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe 27 PID 992 wrote to memory of 1888 992 0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe 27 PID 992 wrote to memory of 1888 992 0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe 27 PID 992 wrote to memory of 1888 992 0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe 27 PID 992 wrote to memory of 1888 992 0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe 27 PID 992 wrote to memory of 1888 992 0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe 27 PID 1888 wrote to memory of 688 1888 irsetup.exe 28 PID 1888 wrote to memory of 688 1888 irsetup.exe 28 PID 1888 wrote to memory of 688 1888 irsetup.exe 28 PID 1888 wrote to memory of 688 1888 irsetup.exe 28 PID 1888 wrote to memory of 688 1888 irsetup.exe 28 PID 1888 wrote to memory of 688 1888 irsetup.exe 28 PID 1888 wrote to memory of 688 1888 irsetup.exe 28 PID 688 wrote to memory of 108 688 cmd.exe 30 PID 688 wrote to memory of 108 688 cmd.exe 30 PID 688 wrote to memory of 108 688 cmd.exe 30 PID 688 wrote to memory of 108 688 cmd.exe 30 PID 688 wrote to memory of 108 688 cmd.exe 30 PID 688 wrote to memory of 108 688 cmd.exe 30 PID 688 wrote to memory of 108 688 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe"C:\Users\Admin\AppData\Local\Temp\0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe__IRAOFF:520716 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\0896705f13b563d7856bf0d53257cada9bee091923fa2fb39b966e3aeb2e436a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c tasklist.exe>list.tmp3⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\tasklist.exetasklist.exe4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4