Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    57s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 16:23

General

  • Target

    32bb625863ebe5b9f950ad0a5772417f6373f9d6291b5c8b8a7bad85656c79d3.exe

  • Size

    225KB

  • MD5

    e70248a4fba71b348fc4519390fe7a3a

  • SHA1

    652368e6a4dd52d40a43d4abe32409a811d522b1

  • SHA256

    32bb625863ebe5b9f950ad0a5772417f6373f9d6291b5c8b8a7bad85656c79d3

  • SHA512

    67f55c7495d25357c9167a5d2b17079a98c273b809dc8c69824e525c7d4054eb2ca83a45bd0b988033f7add8c65e6d542b08ea815885353e9e0d88a32707e121

  • SSDEEP

    6144:42sv4O06yy68dzbnNTO1EcEnGnpvkTE5NPgkGPAN9c:pA4O0NynJjNa1EcEn+rPgkI6c

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32bb625863ebe5b9f950ad0a5772417f6373f9d6291b5c8b8a7bad85656c79d3.exe
    "C:\Users\Admin\AppData\Local\Temp\32bb625863ebe5b9f950ad0a5772417f6373f9d6291b5c8b8a7bad85656c79d3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Roaming\steamwebhelper2\steamwebhelper.exe
      "C:\Users\Admin\AppData\Roaming\steamwebhelper2\steamwebhelper.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\steamwebhelper2\steamwebhelper.exe

    Filesize

    225KB

    MD5

    e70248a4fba71b348fc4519390fe7a3a

    SHA1

    652368e6a4dd52d40a43d4abe32409a811d522b1

    SHA256

    32bb625863ebe5b9f950ad0a5772417f6373f9d6291b5c8b8a7bad85656c79d3

    SHA512

    67f55c7495d25357c9167a5d2b17079a98c273b809dc8c69824e525c7d4054eb2ca83a45bd0b988033f7add8c65e6d542b08ea815885353e9e0d88a32707e121

  • C:\Users\Admin\AppData\Roaming\steamwebhelper2\steamwebhelper.exe

    Filesize

    225KB

    MD5

    e70248a4fba71b348fc4519390fe7a3a

    SHA1

    652368e6a4dd52d40a43d4abe32409a811d522b1

    SHA256

    32bb625863ebe5b9f950ad0a5772417f6373f9d6291b5c8b8a7bad85656c79d3

    SHA512

    67f55c7495d25357c9167a5d2b17079a98c273b809dc8c69824e525c7d4054eb2ca83a45bd0b988033f7add8c65e6d542b08ea815885353e9e0d88a32707e121

  • memory/916-62-0x0000000001000000-0x000000000103E000-memory.dmp

    Filesize

    248KB

  • memory/916-64-0x000000001B036000-0x000000001B055000-memory.dmp

    Filesize

    124KB

  • memory/1236-54-0x0000000000DF0000-0x0000000000E2E000-memory.dmp

    Filesize

    248KB

  • memory/1236-55-0x0000000000140000-0x0000000000176000-memory.dmp

    Filesize

    216KB

  • memory/1236-56-0x0000000000180000-0x0000000000186000-memory.dmp

    Filesize

    24KB

  • memory/1236-57-0x000007FEFB8F1000-0x000007FEFB8F3000-memory.dmp

    Filesize

    8KB

  • memory/1236-58-0x000000001B086000-0x000000001B0A5000-memory.dmp

    Filesize

    124KB