Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 11:22

General

  • Target

    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

  • Size

    1.3MB

  • MD5

    17d61b9d67f0a76218e756e34d9b1986

  • SHA1

    ec2df08b686fa0b1b4fbf92601255faa71111887

  • SHA256

    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

  • SHA512

    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

  • SSDEEP

    24576:JYshbEjfhLN1sxAmHkwl2W54wdgjlpaGXad:JJa97zmHjl2xvaGKd

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe
    "C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\RECYCLER\cft_mon.exe
      C:\RECYCLER\cft_mon.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Windows\SysWOW64\cmd.exe
        /c dir "C:\Program Files (x86)\*" /s >> "C:\RECYCLER\RYNKSFQE\7089980.log"
        3⤵
          PID:1880
      • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe
        "C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:656
        • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe
          "C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:680
          • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe
            "C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe
              "C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1636
              • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe
                "C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:1388
                • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe
                  "C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1144
                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe
                    "C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:1124
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\301DB1~1.EXE
                    8⤵
                      PID:856
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\301DB1~1.EXE
                    7⤵
                      PID:592
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\301DB1~1.EXE
                    6⤵
                      PID:576
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\301DB1~1.EXE
                    5⤵
                      PID:1944
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\301DB1~1.EXE
                    4⤵
                      PID:960
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\301DB1~1.EXE
                    3⤵
                      PID:1632
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\301DB1~1.EXE
                    2⤵
                      PID:560

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\RECYCLER\cft_mon.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    Filesize

                    798KB

                    MD5

                    bfe64d6e9c7d38054239eb03fa5c49d3

                    SHA1

                    79d3386d4cece4624ac2486618310d0376b77797

                    SHA256

                    a574958a2e3ed409fe30980900729164762bba5a2e6b89c32944d4e349a8ace3

                    SHA512

                    5621f2c36289044fd2fc12a2c2d6c8fee5261622c9c862425724ee4b167cb9ecfeea1e6dd5296d417d4970c7906404727cab2b2865d34cce06f95027df2e3d16

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    Filesize

                    798KB

                    MD5

                    bfe64d6e9c7d38054239eb03fa5c49d3

                    SHA1

                    79d3386d4cece4624ac2486618310d0376b77797

                    SHA256

                    a574958a2e3ed409fe30980900729164762bba5a2e6b89c32944d4e349a8ace3

                    SHA512

                    5621f2c36289044fd2fc12a2c2d6c8fee5261622c9c862425724ee4b167cb9ecfeea1e6dd5296d417d4970c7906404727cab2b2865d34cce06f95027df2e3d16

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    Filesize

                    798KB

                    MD5

                    bfe64d6e9c7d38054239eb03fa5c49d3

                    SHA1

                    79d3386d4cece4624ac2486618310d0376b77797

                    SHA256

                    a574958a2e3ed409fe30980900729164762bba5a2e6b89c32944d4e349a8ace3

                    SHA512

                    5621f2c36289044fd2fc12a2c2d6c8fee5261622c9c862425724ee4b167cb9ecfeea1e6dd5296d417d4970c7906404727cab2b2865d34cce06f95027df2e3d16

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    Filesize

                    798KB

                    MD5

                    bfe64d6e9c7d38054239eb03fa5c49d3

                    SHA1

                    79d3386d4cece4624ac2486618310d0376b77797

                    SHA256

                    a574958a2e3ed409fe30980900729164762bba5a2e6b89c32944d4e349a8ace3

                    SHA512

                    5621f2c36289044fd2fc12a2c2d6c8fee5261622c9c862425724ee4b167cb9ecfeea1e6dd5296d417d4970c7906404727cab2b2865d34cce06f95027df2e3d16

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    Filesize

                    798KB

                    MD5

                    bfe64d6e9c7d38054239eb03fa5c49d3

                    SHA1

                    79d3386d4cece4624ac2486618310d0376b77797

                    SHA256

                    a574958a2e3ed409fe30980900729164762bba5a2e6b89c32944d4e349a8ace3

                    SHA512

                    5621f2c36289044fd2fc12a2c2d6c8fee5261622c9c862425724ee4b167cb9ecfeea1e6dd5296d417d4970c7906404727cab2b2865d34cce06f95027df2e3d16

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    Filesize

                    798KB

                    MD5

                    bfe64d6e9c7d38054239eb03fa5c49d3

                    SHA1

                    79d3386d4cece4624ac2486618310d0376b77797

                    SHA256

                    a574958a2e3ed409fe30980900729164762bba5a2e6b89c32944d4e349a8ace3

                    SHA512

                    5621f2c36289044fd2fc12a2c2d6c8fee5261622c9c862425724ee4b167cb9ecfeea1e6dd5296d417d4970c7906404727cab2b2865d34cce06f95027df2e3d16

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • C:\Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • \RECYCLER\cft_mon.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • \RECYCLER\cft_mon.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • \Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • \Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • \Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • \Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • \Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • \Users\Admin\AppData\Local\Temp\301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde.exe

                    Filesize

                    1.3MB

                    MD5

                    17d61b9d67f0a76218e756e34d9b1986

                    SHA1

                    ec2df08b686fa0b1b4fbf92601255faa71111887

                    SHA256

                    301db1409408d2fed0ad0126c665d06f076807f9e38e49377ab79d0ec9cb0bde

                    SHA512

                    1a145ee20e4d58675afd6aec2074b57aecb4bbb3ef4c74eef886ab74fe9036db5580800ad78b2b851924484452b38c91336cddb49fa95bc0ab27c4c32b3dabbb

                  • memory/656-75-0x00000000023C0000-0x000000000240D000-memory.dmp

                    Filesize

                    308KB

                  • memory/656-77-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/656-69-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/680-85-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/680-76-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/1128-67-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/1144-113-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/1144-114-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/1388-100-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/1388-106-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/1636-98-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/1800-91-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/2016-65-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/2016-64-0x0000000000400000-0x000000000044D000-memory.dmp

                    Filesize

                    308KB

                  • memory/2016-66-0x0000000001BE0000-0x0000000001C2D000-memory.dmp

                    Filesize

                    308KB

                  • memory/2016-54-0x0000000075A71000-0x0000000075A73000-memory.dmp

                    Filesize

                    8KB