Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    183s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 18:50

General

  • Target

    09a8354aa390f350e2992d12a73554706645df7843ed1f03880a798555b8abc2.exe

  • Size

    248KB

  • MD5

    f9fcad313857098d303a6ce77a8fcc63

  • SHA1

    0d2337408f358d275c7145211b3a37e374806efb

  • SHA256

    09a8354aa390f350e2992d12a73554706645df7843ed1f03880a798555b8abc2

  • SHA512

    890f5221b8a12336fd141e81412a5082a33aec9bb94b5a78a654bf93c2601d00cab7a64dba9feae19299cfb960154df1b778c5cf4ed23cfa1848692582d24e5a

  • SSDEEP

    6144:pHM5CElofkFWQPtnRneqAKnvmb7/D269fgwMty0e6ndv0Dj:ps5CLkFfnRnWKnvmb7/D26qndv0Dj

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 48 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09a8354aa390f350e2992d12a73554706645df7843ed1f03880a798555b8abc2.exe
    "C:\Users\Admin\AppData\Local\Temp\09a8354aa390f350e2992d12a73554706645df7843ed1f03880a798555b8abc2.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\hiacea.exe
      "C:\Users\Admin\hiacea.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hiacea.exe

    Filesize

    248KB

    MD5

    f7d0e7cf7eeec27b7797de1c6f6736c0

    SHA1

    fe957c382f1e72b92520a8d27f0e85974a3858ff

    SHA256

    5fdf132be5ae16d65805773e36b59eb29649f8d84483282189d84190eb1e5fcb

    SHA512

    5b3ad7118b33dee2c89dee47d981258f0f9ea688035a8cbfb9ed8ca436393a97a533c354be62e03ec04ebdbc0a4feb736d77acbeb040d58e6db9c25946e3d7ba

  • C:\Users\Admin\hiacea.exe

    Filesize

    248KB

    MD5

    f7d0e7cf7eeec27b7797de1c6f6736c0

    SHA1

    fe957c382f1e72b92520a8d27f0e85974a3858ff

    SHA256

    5fdf132be5ae16d65805773e36b59eb29649f8d84483282189d84190eb1e5fcb

    SHA512

    5b3ad7118b33dee2c89dee47d981258f0f9ea688035a8cbfb9ed8ca436393a97a533c354be62e03ec04ebdbc0a4feb736d77acbeb040d58e6db9c25946e3d7ba

  • \Users\Admin\hiacea.exe

    Filesize

    248KB

    MD5

    f7d0e7cf7eeec27b7797de1c6f6736c0

    SHA1

    fe957c382f1e72b92520a8d27f0e85974a3858ff

    SHA256

    5fdf132be5ae16d65805773e36b59eb29649f8d84483282189d84190eb1e5fcb

    SHA512

    5b3ad7118b33dee2c89dee47d981258f0f9ea688035a8cbfb9ed8ca436393a97a533c354be62e03ec04ebdbc0a4feb736d77acbeb040d58e6db9c25946e3d7ba

  • \Users\Admin\hiacea.exe

    Filesize

    248KB

    MD5

    f7d0e7cf7eeec27b7797de1c6f6736c0

    SHA1

    fe957c382f1e72b92520a8d27f0e85974a3858ff

    SHA256

    5fdf132be5ae16d65805773e36b59eb29649f8d84483282189d84190eb1e5fcb

    SHA512

    5b3ad7118b33dee2c89dee47d981258f0f9ea688035a8cbfb9ed8ca436393a97a533c354be62e03ec04ebdbc0a4feb736d77acbeb040d58e6db9c25946e3d7ba

  • memory/1716-56-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB