Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe
Resource
win10v2004-20220901-en
General
-
Target
230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe
-
Size
5.4MB
-
MD5
b496894b974411248daf6037c248d1f4
-
SHA1
548b434ab70b27849d8811a8efde1e1094f3b6fa
-
SHA256
230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd
-
SHA512
0c9db137a85e2bc94ca1d0fd03374c5db953474ef9a25f02220e64a906e9451365d5c5e2904e7ffc3dd2fd05c1a2bed40e7477ff6c7b731dcbb727e7de02ffb2
-
SSDEEP
98304:jE1bnVjJWwuuKrJpVzGVvWJ/PqFgA9/BDI0ggP:41bV+uGVwOJqSoZE0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1040 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1420 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1364 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 1364 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 1364 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1040 1364 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 28 PID 1364 wrote to memory of 1040 1364 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 28 PID 1364 wrote to memory of 1040 1364 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 28 PID 1364 wrote to memory of 1040 1364 230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe 28 PID 1040 wrote to memory of 1420 1040 cmd.exe 30 PID 1040 wrote to memory of 1420 1040 cmd.exe 30 PID 1040 wrote to memory of 1420 1040 cmd.exe 30 PID 1040 wrote to memory of 1420 1040 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe"C:\Users\Admin\AppData\Local\Temp\230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im3⤵
- Kills process with taskkill
PID:1420
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\230f935f734508609e9196e3003f552458b3a19519a59fe3e0bc78117a3f7ebd.bat
Filesize364B
MD505f75049b4a7673afd910dc109683d1b
SHA1dc0fd87ec1da928e8b4a9fa339c7545b2a67fa25
SHA2566017ada26f10202e3cec13629777f0e575fd96f3c047f07c2bb00c47d0292891
SHA51265d5a520f4514fe0e4525a9f422a807e8f449c30acf0bef497b8ef580ed3f5fc6724588c8b2603277f5044d834c28138792516c41ad07021de708666bf9f7d7e