Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe
Resource
win10v2004-20220901-en
General
-
Target
e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe
-
Size
68KB
-
MD5
62a85b798c999abbddb2ab0fbe4c382d
-
SHA1
119eb1790b771ad29349ddbeb0973db317cb159a
-
SHA256
e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985
-
SHA512
32bcd74025a847a95fd98bd75b3ac1a9d72d490f1bac84891e536925a92164dccc823166e33c47c091faa86a2b02e8553efb40160b9fab23b8f885dce76cda08
-
SSDEEP
768:pchliTdGIAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:WhIxrAcqOK3qowgnt1d
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 2032 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe 2032 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe 2032 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2032 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe 28 PID 1244 wrote to memory of 2032 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe 28 PID 1244 wrote to memory of 2032 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe 28 PID 1244 wrote to memory of 2032 1244 e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe"C:\Users\Admin\AppData\Local\Temp\e3a3d6d6d6d26b331742903c3590746d5b12ca6ddc97727443fb898598945985.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5eac7c75c96127b09960ec5e49ece6be0
SHA18548a1d43c5341e8d84490168003205dc96ee093
SHA25663e9f57e225e4a1ad257df919a1b2b47667725036005070eb4313a51541c6ee8
SHA5127585ca5086837020a5dba268960d66148fe8e3a8f3d3afb06d9c8eabf25bbf8df4893189647beee92cba8e462d7e7fb48557883bd26d143698e12c22e41f9cb4
-
Filesize
68KB
MD5eac7c75c96127b09960ec5e49ece6be0
SHA18548a1d43c5341e8d84490168003205dc96ee093
SHA25663e9f57e225e4a1ad257df919a1b2b47667725036005070eb4313a51541c6ee8
SHA5127585ca5086837020a5dba268960d66148fe8e3a8f3d3afb06d9c8eabf25bbf8df4893189647beee92cba8e462d7e7fb48557883bd26d143698e12c22e41f9cb4
-
Filesize
68KB
MD5eac7c75c96127b09960ec5e49ece6be0
SHA18548a1d43c5341e8d84490168003205dc96ee093
SHA25663e9f57e225e4a1ad257df919a1b2b47667725036005070eb4313a51541c6ee8
SHA5127585ca5086837020a5dba268960d66148fe8e3a8f3d3afb06d9c8eabf25bbf8df4893189647beee92cba8e462d7e7fb48557883bd26d143698e12c22e41f9cb4