Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 18:02 UTC
Static task
static1
Behavioral task
behavioral1
Sample
6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe
Resource
win10v2004-20220812-en
General
-
Target
6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe
-
Size
289KB
-
MD5
795c22ec14d24150443be37fce9fae73
-
SHA1
cafdddc3fde7ef1bdcbdd6ca067a57ed2a4f8a9b
-
SHA256
6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a
-
SHA512
76fee17f95cccad4e8cd9b559bc16f009492d45ae37ba8ed7d715df74dae0f518255effd02e8a907cdc737ae6a76a7f2ff9f4e906b8eebc635afcc0cd3884d89
-
SSDEEP
3072:iCA3hovBn7VqEizw6RidCLbJWMrwoO7rnN3lnpkAjL6LBVlvMLL3QveQR1:CxovBn7Vq9RidcZQHN1p3yLxMLLeJ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 dplaysvr.exe -
Loads dropped DLL 2 IoCs
pid Process 856 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe 1728 dplaysvr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1728 dplaysvr.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 856 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe 1728 dplaysvr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 1728 856 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe 28 PID 856 wrote to memory of 1728 856 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe 28 PID 856 wrote to memory of 1728 856 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe 28 PID 856 wrote to memory of 1728 856 6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe"C:\Users\Admin\AppData\Local\Temp\6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\6fbc1dc92a94cda2e12fd18cdfa7fdcf1ae2b440ad120f395f6431e344044e8a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1728
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:1748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5c6bd4c97401be0242c9ddcd5d5da1a91
SHA1fb8f74ab4a3f6ab512c32c0ce0f9f6542867230d
SHA25609e5dd5201d60a47d519ea7b9857e88fe135af3f764667b69edded809c93b2ae
SHA512bd23e74bfc795ff3d11cfabe0cd7111467c8458310409729dcf1798dd1431829927648900f4ab5d1013675f7750e8762ae3fc6deb81fddf644c8a3e089104152
-
Filesize
45KB
MD5505a7c309518b834d684c40c2b5a674b
SHA11756d0ad98525c4289dcbd6284c37b8147316fad
SHA2561819b9fccf0cfe6de0110186d63e25e9209c47478f4cb04bf7ccd63d39145332
SHA512d5c17bc2e1add8d309e26b621d1dc01633fae0c16c2536d25d3a20f15198743386bd929f40896fa8fef3b149b0f1d3a9bfe30eefc853deb6172415432143fb93
-
Filesize
120KB
MD5c6bd4c97401be0242c9ddcd5d5da1a91
SHA1fb8f74ab4a3f6ab512c32c0ce0f9f6542867230d
SHA25609e5dd5201d60a47d519ea7b9857e88fe135af3f764667b69edded809c93b2ae
SHA512bd23e74bfc795ff3d11cfabe0cd7111467c8458310409729dcf1798dd1431829927648900f4ab5d1013675f7750e8762ae3fc6deb81fddf644c8a3e089104152
-
Filesize
120KB
MD5c6bd4c97401be0242c9ddcd5d5da1a91
SHA1fb8f74ab4a3f6ab512c32c0ce0f9f6542867230d
SHA25609e5dd5201d60a47d519ea7b9857e88fe135af3f764667b69edded809c93b2ae
SHA512bd23e74bfc795ff3d11cfabe0cd7111467c8458310409729dcf1798dd1431829927648900f4ab5d1013675f7750e8762ae3fc6deb81fddf644c8a3e089104152
-
Filesize
45KB
MD5505a7c309518b834d684c40c2b5a674b
SHA11756d0ad98525c4289dcbd6284c37b8147316fad
SHA2561819b9fccf0cfe6de0110186d63e25e9209c47478f4cb04bf7ccd63d39145332
SHA512d5c17bc2e1add8d309e26b621d1dc01633fae0c16c2536d25d3a20f15198743386bd929f40896fa8fef3b149b0f1d3a9bfe30eefc853deb6172415432143fb93
-
Filesize
120KB
MD5c6bd4c97401be0242c9ddcd5d5da1a91
SHA1fb8f74ab4a3f6ab512c32c0ce0f9f6542867230d
SHA25609e5dd5201d60a47d519ea7b9857e88fe135af3f764667b69edded809c93b2ae
SHA512bd23e74bfc795ff3d11cfabe0cd7111467c8458310409729dcf1798dd1431829927648900f4ab5d1013675f7750e8762ae3fc6deb81fddf644c8a3e089104152
-
Filesize
45KB
MD5505a7c309518b834d684c40c2b5a674b
SHA11756d0ad98525c4289dcbd6284c37b8147316fad
SHA2561819b9fccf0cfe6de0110186d63e25e9209c47478f4cb04bf7ccd63d39145332
SHA512d5c17bc2e1add8d309e26b621d1dc01633fae0c16c2536d25d3a20f15198743386bd929f40896fa8fef3b149b0f1d3a9bfe30eefc853deb6172415432143fb93